Sciweavers

1834 search results - page 360 / 367
» Public Key Cryptography
Sort
View
PAMI
2006
187views more  PAMI 2006»
13 years 7 months ago
An Experimental Study on Pedestrian Classification
Detecting people in images is key for several important application domains in computer vision. This paper presents an in-depth experimental study on pedestrian classification; mul...
Stefan Munder, Dariu M. Gavrila
IJRR
2007
236views more  IJRR 2007»
13 years 7 months ago
Towards High-resolution Imaging from Underwater Vehicles
Large area mapping at high resolution underwater continues to be constrained by sensor-level environmental constraints and the mismatch between available navigation and sensor acc...
Hanumant Singh, Christopher N. Roman, Oscar Pizarr...
IJRR
2007
104views more  IJRR 2007»
13 years 7 months ago
Deep Space Formation Flying Spacecraft Path Planning
Efficient algorithms for collision-free energy sub-optimal path planning for formations of spacecraft flying in deep space are presented. The idea is to introduce a set of way-poi...
Cornel Sultan, Sanjeev Seereeram, Raman K. Mehra
IJWBC
2007
90views more  IJWBC 2007»
13 years 7 months ago
Salutogenic community building
This paper explores a new approach to community building. It is based on the concept of salutogenesis; a proactive approach to community health which seeks preventative measures i...
Khamphira Viravong
TC
2008
13 years 7 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park