Sciweavers

1466 search results - page 138 / 294
» Completeness of the Authentication Tests
Sort
View
EUC
2007
Springer
14 years 2 months ago
On Using Probabilistic Forwarding to Improve HEC-Based Data Forwarding in Opportunistic Networks
In this paper, we propose the HEC-PF scheme, an enhancement of our previous H-EC scheme for effective data forwarding in opportunistic networks. The enhanced scheme modifies the a...
Ling-Jyh Chen, Cheng-Long Tseng, Cheng-Fu Chou
3DGIS
2006
Springer
14 years 2 months ago
Texture Generation and Mapping Using Video Sequences for 3D Building Models
Abstract Three-dimensional (3D) building model is one of the most important components in a cyber city implementation and application. This study developed an effective and highly ...
Fuan Tsai, Cheng-Hsuan Chen, Jin-Kim Liu, Kuo-Hsin...
CRV
2005
IEEE
181views Robotics» more  CRV 2005»
14 years 1 months ago
Video with Ground-Truth for Validation of Visual Registration, Tracking and Navigation Algorithms
A fundamental task in computer vision is that of determining the position and orientation of a moving camera relative to an observed object or scene. Many such visual tracking alg...
Rustam Stolkin, Alistair Greig, John Gilby
ESCIENCE
2005
IEEE
14 years 1 months ago
GAMA: Grid Account Management Architecture
Security is a critical component of grid systems and while there are numerous software components and tools that provide some capabilities relating to security, there are few comp...
Karan Bhatia, Sandeep Chandra, Kurt Mueller
ITCC
2005
IEEE
14 years 1 months ago
Disciplined Methods of Software Specification: A Case Study
We describe our experience applying tabular mathematical approaches to software specifications. Our purpose is to show alternative approaches to writing tabular specifications and...
Robert L. Baber, David Lorge Parnas, Sergiy A. Vil...