Sciweavers

1580 search results - page 127 / 316
» Non-Interference Through Determinism
Sort
View
TKDE
2010
159views more  TKDE 2010»
13 years 8 months ago
The Tiled Bitmap Forensic Analysis Algorithm
— Tampering of a database can be detected through the use of cryptographically-strong hash functions. Subsequently-applied forensic analysis algorithms can help determine when, w...
Kyriacos E. Pavlou, Richard T. Snodgrass
ACL
2010
13 years 8 months ago
Learning to Follow Navigational Directions
We present a system that learns to follow navigational natural language directions. Where traditional models learn from linguistic annotation or word distributions, our approach i...
Adam Vogel, Daniel Jurafsky
GLOBECOM
2010
IEEE
13 years 8 months ago
Distributed Scheduling and Routing in Underwater Wireless Networks
Abstract--Several underwater network characteristics, including long propagation delays and a bandwidth dependent on distance, provide unique challenges to protocol designers. In t...
Kurtis B. Kredo II, Prasant Mohapatra
ICPR
2010
IEEE
13 years 8 months ago
Active Calibration of Camera-Projector Systems Based on Planar Homography
This paper presents a simple and active calibration technique of camera-projector systems based on planar homography. From the camera image of a planar calibration pattern, we gene...
Soon-Yong Park, Go Gwang Park
SENSYS
2010
ACM
13 years 8 months ago
PipeProbe: a mobile sensor droplet for mapping hidden pipeline
This paper presents PipeProbe, a mobile sensor system for determining the spatial topology of hidden water pipelines behind walls. PipeProbe works by dropping a tiny wireless sens...
Tsung-Te Lai, Yu-Han Chen, Polly Huang, Hao-Hua Ch...