Sciweavers

1342 search results - page 218 / 269
» Managing Collaboration in the nanoManipulator
Sort
View
ICIP
2006
IEEE
14 years 9 months ago
Video Surveillance using Dynamic Configuration of Mutiple Active Cameras
In this paper, we present a coordinated video surveillance system that can minimize the spatial limitation and can precisely extract the 3D position of objects. To do this, our sy...
Nyoun Kim, Ig-Jae Kim, Hyoung-Gon Kim
GIS
2009
ACM
14 years 9 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
ISBI
2004
IEEE
14 years 8 months ago
Software Process: The Key to Developing Robust, Reusable and Maintainable Open-Source Software
The practice of image processing inherently requires software development. Creating this technology requires designing, implementing, debugging and testing software applications o...
Ken Martin, Luis Ibáñez, William J. ...
WWW
2007
ACM
14 years 8 months ago
Simple authentication for the web
Automated email-based password reestablishment (EBPR) is an efficient, cost-effective means to deal with forgotten passwords. In this technique, email providers authenticate users ...
Timothy W. van der Horst, Kent E. Seamons
WWW
2005
ACM
14 years 8 months ago
Designing learning services: from content-based to activity-based learning systems
The need for e-learning systems that support a diverse set of pedagogical requirements has been identified as an important issue in web-based education. Until now, significant R&a...
Pythagoras Karampiperis, Demetrios G. Sampson