Sciweavers

1266 search results - page 174 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
CVIU
2010
429views more  CVIU 2010»
15 years 4 months ago
Cascade of descriptors to detect and track objects across any network of cameras
Most multi-camera systems assume a well structured environment to detect and track objects across cameras. Cameras need to be fixed and calibrated, or only objects within a traini...
Alexandre Alahi, Pierre Vandergheynst, Michel Bier...
ICPPW
2003
IEEE
15 years 9 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
VISSYM
2007
15 years 6 months ago
Dimensional Congruence for Interactive Visual Data Mining and Knowledge Discovery
Many authors in the field of 3D human computer interaction have described the advantages of 3D user interfaces: Intuitive metaphors from daily life, immersive workspaces, virtual ...
Sebastian Baumgärtner, Achim Ebert, Matthias ...
TPDS
2010
159views more  TPDS 2010»
15 years 2 months ago
Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks
The circular sensing model has been widely used to estimate performance of sensing applications in existing analysis and simulations. While this model provides valuable high-level...
Joengmin Hwang, Tian He, Yongdae Kim
IPPS
2008
IEEE
15 years 10 months ago
Absolute Slicing in Peer-to-peer Systems
Peer-to-peer (P2P) systems are slowly moving from application-specific architectures to a generic serviceoriented design framework. The idea is to allow a dynamic collection of P...
Alberto Montresor, Roberto Zandonati