Sciweavers

204 search results - page 21 / 41
» Environment Authentication Through 3D Structural Analysis
Sort
View
ICCV
2001
IEEE
14 years 10 months ago
Performance Evaluation of Stereo for Tele-presence
In an immersive tele-presence environment a 3D remote real scene is projected from the viewpoint of the local user. This 3D world is acquired through stereo reconstruction at the ...
Jane Mulligan, Volkan Isler, Konstantinos Daniilid...
VISUALIZATION
1998
IEEE
14 years 26 days ago
Three-dimensional visualization of microstructures
This case study describes a technique for the three-dimensional analysis of the internal microscopic structure ("microstructure") of materials. This technique consists o...
Marco Lanzagorta, Milo V. Kral, J. Edward Swan II,...
VLDB
2007
ACM
138views Database» more  VLDB 2007»
14 years 8 months ago
CADS: Continuous Authentication on Data Streams
We study processing and authentication of long-running queries on outsourced data streams. In this scenario, a data owner (DO) constantly transmits its data to a service provider ...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
CCGRID
2003
IEEE
14 years 1 months ago
Using grid technologies to face medical image analysis challenges
The availability of digital imagers inside hospitals and their ever growing inspection capabilities have established digital medical images as a key component of many pathologies ...
Johan Montagnat, Vincent Breton, Isabelle E. Magni...
APN
2008
Springer
13 years 10 months ago
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
Abstract. In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authent...
Roland Bouroulet, Raymond R. Devillers, Hanna Klau...