Sciweavers

5600 search results - page 984 / 1120
» Synthesizing robust systems
Sort
View
ICISC
2004
127views Cryptology» more  ICISC 2004»
15 years 4 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
ICVGIP
2004
15 years 4 months ago
Multi-Cue Exemplar-Based Nonparametric Model for Gesture Recognition
This paper presents an approach for a multi-cue, viewbased recognition of gestures. We describe an exemplarbased technique that combines two different forms of exemplars - shape e...
Vinay D. Shet, V. Shiv Naga Prasad, Ahmed M. Elgam...
DICTA
2003
15 years 4 months ago
3D Face Recognition Using Longitudinal Section and Transection
In this paper, a new practical implementation of a person verification system using features of longitudinal section and transection and other facial, rotation compensated 3D face ...
Yeung-hak Lee
IAAI
2001
15 years 4 months ago
Token Allocation Strategy for Free-Flight Conflict Solving
For the last 10 years, airlines have widely supported research on the development of airspaces where aircraft would be free to decide their trajectory: these areas where called Fr...
Géraud Granger, Nicolas Durand, Jean-Marc A...
OPODIS
2004
15 years 4 months ago
Comparison of Failures and Attacks on Random and Scale-Free Networks
Abstract. It appeared recently that some statistical properties of complex networks like the Internet, the World Wide Web or Peer-to-Peer systems have an important influence on the...
Jean-Loup Guillaume, Matthieu Latapy, Cléme...