Sciweavers

832 search results - page 106 / 167
» Effect of Malicious Synchronization
Sort
View
ISVC
2010
Springer
13 years 11 months ago
Single camera stereo system using prism and mirrors
Stereo and 3D reconstruction are used by many applications such as object modeling, facial expression studies and human motion analysis. But synchronizing multiple high frame rate ...
Gowri Somanath, Rohith MV, Chandra Kambhamettu
COMCOM
2006
115views more  COMCOM 2006»
13 years 10 months ago
Energy-efficient scheduling and hybrid communication architecture for underwater littoral surveillance
There exists a high demand for reliable, high capacity underwater acoustic networks to allow efficient data gathering and information exchange. This is evidenced by significant re...
Mihaela Cardei
JSW
2008
122views more  JSW 2008»
13 years 10 months ago
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols
Abstract-- In this paper, we analyze the security vulnerabilities of a family of ultra-lightweight RFID mutual authentication protocols: LMAP [13], M2 AP [14] and EMAP [15], which ...
Tieyan Li, Guilin Wang, Robert H. Deng
JUCS
2008
141views more  JUCS 2008»
13 years 10 months ago
Designing Collaborative User Interfaces for Ubiquitous Applications Using CIAM: The AULA Case Study
: In this article we explain how we apply the CIAM methodology based on the CIAN notation in order to generate user interfaces in collaborative applications. CIAM has been applied ...
Maximiliano Paredes, Ana I. Molina, Miguel A. Redo...
PRESENCE
2006
85views more  PRESENCE 2006»
13 years 10 months ago
On Consistency and Network Latency in Distributed Interactive Applications: A Survey - Part I
This paper is the first part of a two-part paper that documents a detailed survey of the research carried out on consistency and latency in distributed interactive applications (D...
Declan Delaney, Tomás Ward, Séamus M...