Sciweavers

1891 search results - page 256 / 379
» Constrained Subspace Modelling
Sort
View
ISORC
2008
IEEE
15 years 8 months ago
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
In this paper, a Role-based Access Control (RBAC) model is applied and extended to a multimedia version called Multi-Role Based Access Control (MRBAC), which can fully support the...
Na Zhao, Min Chen, Shu-Ching Chen, Mei-Ling Shyu
GLOBECOM
2007
IEEE
15 years 8 months ago
Cognitive Medium Access: A Protocol for Enhancing Coexistence in WLAN Bands
— In this paper we propose Cognitive Medium Access (CMA), a protocol aimed at improving coexistence with a set of independently evolving WLAN bands. A time-slotted physical layer...
Stefan Geirhofer, Lang Tong, Brian M. Sadler
ICASSP
2007
IEEE
15 years 8 months ago
Speeded Up Gradient Vector Flow B-Spline Active Contours for Robust and Real-Time Tracking
Segmentation and tracking methods have been widely explore. However, they are often computationally heavy or require constraining assumptions. We present in this paper a new syste...
Joanna I. Olszewska, Christophe De Vleeschouwer, B...
ICRA
2007
IEEE
123views Robotics» more  ICRA 2007»
15 years 8 months ago
Design and Theoretical Evaluation of Micro-Surgical Manipulators for Orbital Manipulation and Intraocular Dexterity
—This paper addresses the design considerations and dexterity evaluation of a novel hybrid two-armed micro-surgical slave robot equipped with intraocular dexterity devices. A uni...
Wei Wei, Roger E. Goldman, Nabil Simaan, Howard F....
IPPS
2007
IEEE
15 years 8 months ago
A Combinatorial Analysis of Distance Reliability in Star Network
This paper addresses a constrained two-terminal reliability measure referred to as Distance Reliability (DR) between the source node u and the destination node I with the shortest...
Xiaolong Wu, Shahram Latifi, Yingtao Jiang