Sciweavers

324 search results - page 51 / 65
» Detecting common elements of types
Sort
View
ICCCN
2008
IEEE
14 years 1 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
3DPVT
2006
IEEE
186views Visualization» more  3DPVT 2006»
14 years 1 months ago
Range Image Registration Based on Circular Features
Range sensing technology allows the photo-realistic modeling of large-scale scenes, such as urban structures. A major bottleneck in the process of 3D scene acquisition is the auto...
Cecilia Chao Chen, Ioannis Stamos
HPCC
2009
Springer
14 years 3 days ago
A Compensation-Based Reliable Data Delivery for Instant Wireless Sensor Network
Instant wireless sensor network (IWSN) is a type of WSN deployed for a class of special applications which have the common requirement on instantly responding for collecting and t...
Yi-Ying Zhang, Xi Luo, Laurence Tianruo Yang, Lei ...
AGENTS
1997
Springer
13 years 11 months ago
Progressive Negotiation For Time-Constrained Autonomous Agents
We address in this paper a problem of autonomous agents performing in a common environment where each agent has its goal to achieve before a given deadline. Agents must be able to...
Abdel-Illah Mouaddib
MVA
2007
161views Computer Vision» more  MVA 2007»
13 years 9 months ago
Using Space-Time Interest Points for Video Sequence Synchronization
We introduce an algorithm for synchronizing two video sequences recorded by stationary cameras. It extends common RANSAC-based approaches that recover either a homography or a fun...
Daniel Wedge, Du Huynh, Peter Kovesi