Sciweavers

2028 search results - page 154 / 406
» Deriving Relation Keys from XML Keys
Sort
View
CLEAR
2007
Springer
211views Biometrics» more  CLEAR 2007»
15 years 10 months ago
An Appearance-Based Particle Filter for Visual Tracking in Smart Rooms
This paper presents a visual particle filter for tracking a variable number of humans interacting in indoor environments, using multiple cameras. It is built upon a 3-dimensional,...
Oswald Lanz, Paul Chippendale, Roberto Brunelli
130
Voted
GPC
2007
Springer
15 years 10 months ago
Towards Feasible and Effective Load Sharing in a Heterogeneous Computational Grid
A grid has to provide strong incentive for participating sites to join and stay in it. Participating sites are concerned with the performance improvement brought by the gird for th...
Kuo-Chan Huang, Po-Chi Shih, Yeh-Ching Chung
IAT
2006
IEEE
15 years 10 months ago
A Multi-stage Graph Decomposition Algorithm for Distributed Constraint Optimisation
In this paper, we propose a novel approach to solving the distributed constraint optimisation problem (DCOP) that guarantees completeness, while having linear communication comple...
Terence H.-W. Law, Adrian R. Pearce
DATE
2005
IEEE
121views Hardware» more  DATE 2005»
15 years 10 months ago
Reduction of CMOS Power Consumption and Signal Integrity Issues by Routing Optimization
— This paper suggests a methodology to decrease the power of a static CMOS standard cell design at layout level by focusing on switched capacitance. The term switched is the key:...
Paul Zuber, Armin Windschiegl, Raúl Medina ...
IEEECIT
2005
IEEE
15 years 10 months ago
Identity Based Threshold Proxy Signcryption Scheme
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. ...
Meng Wang, Zhijing Liu