Sciweavers

5600 search results - page 984 / 1120
» Synthesizing robust systems
Sort
View
ICISC
2004
127views Cryptology» more  ICISC 2004»
14 years 22 hour ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
ICVGIP
2004
14 years 21 hour ago
Multi-Cue Exemplar-Based Nonparametric Model for Gesture Recognition
This paper presents an approach for a multi-cue, viewbased recognition of gestures. We describe an exemplarbased technique that combines two different forms of exemplars - shape e...
Vinay D. Shet, V. Shiv Naga Prasad, Ahmed M. Elgam...
DICTA
2003
14 years 18 hour ago
3D Face Recognition Using Longitudinal Section and Transection
In this paper, a new practical implementation of a person verification system using features of longitudinal section and transection and other facial, rotation compensated 3D face ...
Yeung-hak Lee
IAAI
2001
14 years 18 hour ago
Token Allocation Strategy for Free-Flight Conflict Solving
For the last 10 years, airlines have widely supported research on the development of airspaces where aircraft would be free to decide their trajectory: these areas where called Fr...
Géraud Granger, Nicolas Durand, Jean-Marc A...
OPODIS
2004
14 years 13 hour ago
Comparison of Failures and Attacks on Random and Scale-Free Networks
Abstract. It appeared recently that some statistical properties of complex networks like the Internet, the World Wide Web or Peer-to-Peer systems have an important influence on the...
Jean-Loup Guillaume, Matthieu Latapy, Cléme...