Sciweavers

2907 search results - page 527 / 582
» Trust analysis with clustering
Sort
View
TIFS
2008
208views more  TIFS 2008»
13 years 10 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
IVC
2007
104views more  IVC 2007»
13 years 10 months ago
Text segmentation in color images using tensor voting
In natural scene, text elements are corrupted by many types of noise, such as streaks, highlights, or cracks. These effects make the clean and automatic segmentation very difficu...
Jaeguyn Lim, Jonghyun Park, Gérard G. Medio...
JIB
2007
89views more  JIB 2007»
13 years 10 months ago
A Methodology for Comparative Functional Genomics
The continuing and rapid increase in the number of fully sequenced genomes is creating new opportunities for comparative studies. However, although many genomic databases store da...
Intikhab Alam, Mike Cornell, Darren M. Soanes, Cor...
JWSR
2007
114views more  JWSR 2007»
13 years 10 months ago
Development of Distance Measures for Process Mining, Discovery and Integration
: Business processes continue to play an important role in today’s service-oriented enterprise computing systems. Mining, discovering, and integrating process-oriented services h...
Joonsoo Bae, Ling Liu, James Caverlee, Liang-Jie Z...
VC
2008
118views more  VC 2008»
13 years 10 months ago
Enriching a motion database by analogous combination of partial human motions
We synthesize new human body motions from existing motion data. We divide the body of an animated character into several parts, such as to upper and lower body, and partition the m...
Won-Seob Jang, Won-Kyu Lee, In-Kwon Lee, Jehee Lee