Sciweavers

3379 search results - page 449 / 676
» Powers of Two
Sort
View
140
Voted
VTC
2007
IEEE
159views Communications» more  VTC 2007»
15 years 10 months ago
Data Fragmentation Scheme in IEEE 802.15.4 Wireless Sensor Networks
— The IEEE 802.15.4 Medium Access Control (MAC) protocol is designed for low data rate, short distance and low power communication applications such as Wireless Sensor Networks (...
Jongwon Yoon, Hyogon Kim, Jeong-Gil Ko
156
Voted
ACCV
2007
Springer
15 years 10 months ago
Palmprint Recognition Under Unconstrained Scenes
This paper presents a novel real-time palmprint recognition system for cooperative user applications. This system is the first one achieving noncontact capturing and recognizing pa...
Yufei Han, Zhenan Sun, Fei Wang, Tieniu Tan
99
Voted
ASIACRYPT
2007
Springer
15 years 10 months ago
Secure Protocols with Asymmetric Trust
Abstract. In the standard general-adversary model for multi-party protocols, a global adversary structure is given, and every party must trust in this particular structure. We intr...
Ivan Damgård, Yvo Desmedt, Matthias Fitzi, J...
134
Voted
DAGM
2007
Springer
15 years 10 months ago
Curvature Guided Level Set Registration Using Adaptive Finite Elements
Abstract. We consider the problem of non-rigid, point-to-point registration of two 3D surfaces. To avoid restrictions on the topology, we represent the surfaces as a level-set of t...
Andreas Dedner, Marcel Lüthi, Thomas Albrecht...
131
Voted
DAWAK
2007
Springer
15 years 10 months ago
OLAP Technology for Business Process Intelligence: Challenges and Solutions
The emerging area of business process intelligence aims at enhancing the analysis power of business process management systems by employing data warehousing and mining technologies...
Svetlana Mansmann, Thomas Neumuth, Marc H. Scholl