Sciweavers

2929 search results - page 534 / 586
» Robust Hand Detection
Sort
View
JSAC
2007
93views more  JSAC 2007»
13 years 9 months ago
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
— Vehicular Networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor an...
Maxim Raya, Panagiotis Papadimitratos, Imad Aad, D...
CN
2004
108views more  CN 2004»
13 years 9 months ago
Smart dust, friend or foe?--Replacing identity with configuration trust
Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
Howard Chivers, John A. Clark
BIOINFORMATICS
2002
146views more  BIOINFORMATICS 2002»
13 years 9 months ago
A duplication growth model of gene expression networks
Motivation: There has been considerable interest in developing computational techniques for inferring genetic regulatory networks from whole-genome expression profiles. When expre...
Ashish Bhan, David J. Galas, T. Gregory Dewey
IJCV
2000
230views more  IJCV 2000»
13 years 9 months ago
Design and Use of Linear Models for Image Motion Analysis
Linear parameterized models of optical flow, particularly affine models, have become widespread in image motion analysis. The linear model coefficients are straightforward to estim...
David J. Fleet, Michael J. Black, Yaser Yacoob, Al...
IJNM
2000
91views more  IJNM 2000»
13 years 9 months ago
Coding-based schemes for fault identification in communication networks
The complexity of communication networks and the amount of information transferred in these networks have made the management of such networks increasingly difficult. Since faults ...
Chi-Chun Lo, Shing Hong Chen, Bon-Yeh Lin