Sciweavers

3238 search results - page 236 / 648
» Multi-return function call
Sort
View
ISPA
2005
Springer
14 years 1 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...
WADS
2005
Springer
111views Algorithms» more  WADS 2005»
14 years 1 months ago
On Geometric Dilation and Halving Chords
Let G be an embedded planar graph whose edges may be curves. The detour between two points, p and q (on edges or vertices) of G, is the ratio between the shortest path in G between...
Adrian Dumitrescu, Annette Ebbers-Baumann, Ansgar ...
CVDB
2004
ACM
14 years 1 months ago
The PIBE Personalizable Image Browsing Engine
In this paper we describe PIBE, a new Personalizable Image Browsing Engine that allows an effective visual exploration of large image collections combining computer vision and da...
Ilaria Bartolini, Paolo Ciaccia, Marco Patella
SAC
2004
ACM
14 years 1 months ago
Boundary extraction in thermal images by edge map
Extracting object boundaries in thermal images is a challenging task because of the amorphous nature of the images and the lack of sharp boundaries. Classical edge-based segmentat...
Quming Zhou, Zhuojing Li, Jake K. Aggarwal
ECCV
2004
Springer
14 years 1 months ago
Null Space Approach of Fisher Discriminant Analysis for Face Recognition
The null space of the within-class scatter matrix is found to express most discriminative information for the small sample size problem (SSSP). The null space-based LDA takes full ...
Wei Liu, Yunhong Wang, Stan Z. Li, Tieniu Tan