Sciweavers

528 search results - page 60 / 106
» Modularizing error recovery
Sort
View
IJACT
2008
136views more  IJACT 2008»
13 years 7 months ago
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
Mike Burmester, Breno de Medeiros, Rossana Motta
ECCV
2008
Springer
14 years 9 months ago
Projected Texture for Object Classification
Algorithms for classification of 3D objects either recover the depth information lost during imaging using multiple images, structured lighting, image cues, etc. or work directly t...
Avinash Sharma, Anoop M. Namboodiri
MICRO
2003
IEEE
166views Hardware» more  MICRO 2003»
14 years 27 days ago
Razor: A Low-Power Pipeline Based on Circuit-Level Timing Speculation
With increasing clock frequencies and silicon integration, power aware computing has become a critical concern in the design of embedded processors and systems-on-chip. One of the...
Dan Ernst, Nam Sung Kim, Shidhartha Das, Sanjay Pa...
FGR
2006
IEEE
144views Biometrics» more  FGR 2006»
14 years 1 months ago
A Layered Deformable Model for Gait Analysis
In this paper, a layered deformable model (LDM) is proposed for human body pose recovery in gait analysis. This model is inspired by the manually labeled silhouettes in [6] and it...
Haiping Lu, Konstantinos N. Plataniotis, Anastasio...
CNSR
2005
IEEE
14 years 1 months ago
Shortest-Hop Based Reliable Network Multicast
Although many multicast communication protocols have been recommended at IETF, reliable multicast communications currently rely on programs built at the application layer, e.g., m...
Ka Lun Eddie Law, Daniel Siu