Sciweavers

2061 search results - page 308 / 413
» Authorization for Metacomputing Applications
Sort
View
TOG
2002
133views more  TOG 2002»
15 years 3 months ago
Interactive motion generation from examples
There are many applications that demand large quantities of natural looking motion. It is difficult to synthesize motion that looks natural, particularly when it is people who mus...
Okan Arikan, David A. Forsyth
PAMI
2007
196views more  PAMI 2007»
15 years 3 months ago
Bayesian Analysis of Lidar Signals with Multiple Returns
—Time-Correlated Single Photon Counting and Burst Illumination Laser data can be used for range profiling and target classification. In general, the problem is to analyze the res...
Sergio Hernandez-Marin, Andrew M. Wallace, Gavin J...
HUC
2010
Springer
15 years 2 months ago
Vehicular speed estimation using received signal strength from mobile phones
This paper introduces an algorithm that estimates the speed of a mobile phone by matching time-series signal strength data to a known signal strength trace from the same road. Kno...
Gayathri Chandrasekaran, Tam Vu, Alexander Varshav...
QRE
2010
84views more  QRE 2010»
15 years 2 months ago
Three-level and mixed-level orthogonal arrays for lean designs
Orthogonal arrays (OA’s) are widely used in design of experiments. Each OA has a specific number of rows that is fixed by the number of factors in the OA and the number of leve...
Chang-Xing Ma, Ming-Yao Ai, L. Y. Chan, T. N. Goh
TRUST
2010
Springer
15 years 2 months ago
Key Attestation from Trusted Execution Environments
Abstract. Credential platforms implemented on top of Trusted Execution Environments3 (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwo...
Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ek...