Sciweavers

2347 search results - page 373 / 470
» Location, location, location: a study of bluejacking practic...
Sort
View
DEXAW
2006
IEEE
116views Database» more  DEXAW 2006»
14 years 1 months ago
Architecture Evaluation for Distributed Auto-ID Systems
Auto-ID technologies allow capturing the time and location of products in the supply chain for tracking and tracing. This paves the way for a variety of business applications, suc...
Hong Hai Do, Jürgen Anke, Gregor Hackenbroich
ICMCS
2006
IEEE
155views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Detecting Human Action in Active Video
We propose a novel scheme to detect human actions in active video. Active videos such as movies or sports broadcasting are taken purposively by “clever” photographers. They ar...
Hao Jiang, Ze-Nian Li, Mark S. Drew
ISCAS
2006
IEEE
90views Hardware» more  ISCAS 2006»
14 years 1 months ago
Feature competition in a spike-based winner-take-all VLSI network
— Recurrent networks and hardware analogs that perform a winner-take-all computation have been studied extensively. This computation is rarely demonstrated in a spiking network o...
Shih-Chii Liu, Matthias Oster
BROADNETS
2005
IEEE
14 years 1 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang
ICMCS
2005
IEEE
170views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Affective content analysis in comedy and horror videos by audio emotional event detection
We study the problem of affective content analysis. In this paper we think of affective contents as those video/audio segments, which may cause an audience’s strong reactions or...
Min Xu, Liang-Tien Chia, Jesse S. Jin