Sciweavers

796 search results - page 36 / 160
» Spoofing prevention method
Sort
View
APNOMS
2006
Springer
14 years 1 months ago
Autonomic Management of Scalable Load-Balancing for Ubiquitous Networks
In ubiquitous networks, a lot of sensors and RFID readers will be connected to the networks as well as PCs and mobile phones are connected, and huge numbers of transactions are exp...
Toshio Tonouchi, Yasuyuki Beppu
CVPR
1998
IEEE
14 years 1 months ago
Appearance Based Behavior Recognition by Event Driven Selective Attention
Most of behavior recognition methods proposed so far share the limitations of bottom-up analysis, and singleobject assumption; the bottom-up analysis can be confused by erroneous ...
Toshikazu Wada, Takashi Matsuyama
IJVR
2007
72views more  IJVR 2007»
13 years 9 months ago
MACBETH: Management of Avatar Conflict by Employment of a Technique Hybrid
—When a virtual environment system prevents a user’s avatar hand from penetrating virtual objects, the seen and felt positions of the hand separate. We propose a new method for...
Eric Burns, Sharif Razzaque, Mary C. Whitton, Fred...
CG
2002
Springer
13 years 9 months ago
Secret image sharing
Abstract. We present a novel hybrid method that includes a modulated scheme for reducing the distortion of the reconstructed image and a two-layered structure for grouping particip...
Chih-Ching Thien, Ja-Chen Lin
MTA
2007
72views more  MTA 2007»
13 years 9 months ago
An improved variable-size block-matching algorithm
In this paper, we proposed an improved “bottom-up” variable-size block matching method. Different from previous work, the proposed method does not need any threshold during th...
Haifeng Wang, Qingshan Liu, Hanqing Lu