Sciweavers

823 search results - page 138 / 165
» Distributed Cipher Services Using Object Activation
Sort
View
KDD
2009
ACM
196views Data Mining» more  KDD 2009»
14 years 2 months ago
WhereNext: a location predictor on trajectory pattern mining
The pervasiveness of mobile devices and location based services is leading to an increasing volume of mobility data. This side effect provides the opportunity for innovative meth...
Anna Monreale, Fabio Pinelli, Roberto Trasarti, Fo...
CVPR
2008
IEEE
14 years 10 months ago
Kernel-based learning of cast shadows from a physical model of light sources and surfaces for low-level segmentation
In background subtraction, cast shadows induce silhouette distortions and object fusions hindering performance of high level algorithms in scene monitoring. We introduce a nonpara...
André Zaccarin, Nicolas Martel-Brisson
ATAL
2005
Springer
14 years 1 months ago
Physical deployment of digital pheromones through RFID technology
Pheromone-based multiagent interaction has received a growing attention in the past few years. Still, so far, the number of deployed systems exploiting pheromones for coordinating...
Marco Mamei, Franco Zambonelli
SIGGRAPH
1993
ACM
14 years 6 hour ago
Pad: an alternative approach to the computer interface
We believe that navigation in information spaces is best supported by tapping into our natural spatial and geographic ways of thinking. To this end, we are developing a new comput...
Ken Perlin, David Fox
PAAMS
2010
Springer
14 years 21 days ago
Advantages of MAS for the Resolution of a Power Management Problem in Smart Homes
Abstract This paper contributes to the design of intelligent buildings. A MultiAgents Home Automation System (MAHAS) is proposed which controls appliances and energy sources in bui...
Shadi Abras, Sylvie Pesty, Stéphane Ploix, ...