Sciweavers

641 search results - page 80 / 129
» Identifying Contingency Requirements Using Obstacle Analysis
Sort
View
ACCV
2007
Springer
14 years 3 months ago
Human Pose Estimation from Volume Data and Topological Graph Database
This paper proposes a novel volume-based motion capture method using a bottom-up analysis of volume data and an example topology database of the human body. By using a two-step gra...
Hidenori Tanaka, Atsushi Nakazawa, Haruo Takemura
SP
1997
IEEE
163views Security Privacy» more  SP 1997»
14 years 1 months ago
Anonymous Connections and Onion Routing
Onion Routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and tra c a...
Paul F. Syverson, David M. Goldschlag, Michael G. ...
CACM
1999
138views more  CACM 1999»
13 years 9 months ago
Onion Routing
Onion Routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and tra c a...
David M. Goldschlag, Michael G. Reed, Paul F. Syve...
POLICY
2005
Springer
14 years 3 months ago
Deriving Semantic Models from Privacy Policies
Natural language policies describe interactions between and across organizations, third-parties and individuals. However, current policy languages are limited in their ability to ...
Travis D. Breaux, Annie I. Antón
MABS
2004
Springer
14 years 3 months ago
Change Your Tags Fast! - A Necessary Condition for Cooperation?
Since Holland (1993) introduced the concept of tags as a possible cooperation forming mechanism in evolving system (among other things) a number of tag models with intriguing, and ...
David Hales