Sciweavers

420 search results - page 48 / 84
» Examining the Relationships between Performance Requirements...
Sort
View
ICNP
2003
IEEE
14 years 1 months ago
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
A prerequisite for secure communication between two nodes in an ad hoc network is that the nodes share a key to bootstrap their trust relationship. In this paper, we present a sca...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
ICIAP
1995
ACM
13 years 11 months ago
Image Retrieval by Elastic Matching of User Sketches
—Effective image retrieval by content from database requires that visual image properties are used instead of textual labels to properly index and recover pictorial data. Retriev...
Alberto Del Bimbo, Pietro Pala
TEI
2010
ACM
129views Hardware» more  TEI 2010»
13 years 8 months ago
Silent mutations: physical-digital interactions in spaces
Many installations research efforts today explore how to engage participants with embedded digital content and applications in interactive environments. Yet the interactive design...
Claudia Rébola Winegarden, Nicholas Komor, ...
PAMI
2008
132views more  PAMI 2008»
13 years 7 months ago
Trajectory Association across Multiple Airborne Cameras
A camera mounted on an aerial vehicle provides an excellent means to monitor large areas of a scene. Utilizing several such cameras on different aerial vehicles allows further flex...
Yaser Sheikh, Mubarak Shah
JCB
2000
87views more  JCB 2000»
13 years 7 months ago
Comparison of Additive Trees Using Circular Orders
It has been postulated that existing species have been linked in the past in a way that can be described using an additive tree structure. Any such tree structure reflecting speci...
Vladimir Makarenkov, Bruno Leclerc