Sciweavers

5196 search results - page 1021 / 1040
» State of Application Assessment
Sort
View
JUCS
2008
113views more  JUCS 2008»
13 years 7 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
JEI
2006
246views more  JEI 2006»
13 years 7 months ago
Fuzzy logic recursive motion detection and denoising of video sequences
We propose a fuzzy logic recursive scheme for motion detection and spatiotemporal filtering that can deal with the Gaussian noise and unsteady illumination conditions in both the t...
Vladimir Zlokolica, Aleksandra Pizurica, Wilfried ...
PAMI
2008
183views more  PAMI 2008»
13 years 7 months ago
Shape-and-Behavior Encoded Tracking of Bee Dances
Behavior analysis of social insects has garnered impetus in recent years and has led to some advances in fields like control systems, flight navigation etc. Manual labeling of ins...
Ashok Veeraraghavan, Rama Chellappa, Mandyam Srini...
PRL
2008
198views more  PRL 2008»
13 years 7 months ago
Pose estimation and tracking using multivariate regression
This paper presents an extension of the relevance vector machine (RVM) algorithm to multivariate regression. This allows the application to the task of estimating the pose of an a...
Arasanathan Thayananthan, Ramanan Navaratnam, Bj&o...
IEICET
2007
93views more  IEICET 2007»
13 years 7 months ago
Experimental Evaluation of Decision Criteria for WLAN Handover: Signal Strength and Frame Retransmission
Abstract. In ubiquitous networks, Mobile Nodes (MNs) may often suffer from performance degradation due to the following two reasons: (1) reduction of signal strength by an MN’s m...
Kazuya Tsukamoto, Takeshi Yamaguchi, Shigeru Kashi...
« Prev « First page 1021 / 1040 Last » Next »