Sciweavers

345 search results - page 31 / 69
» When Systems Loose their Identity
Sort
View
ICDCS
2011
IEEE
12 years 9 months ago
Delay-Cognizant Reliable Delivery for Publish/Subscribe Overlay Networks
—The number of real-world applications that require QoS guarantees is constantly increasing and they often follow the publish/subscribe (pub/sub) messaging paradigm, which provid...
Shuo Guo, Kyriakos Karenos, Minkyong Kim, Hui Lei,...
AINA
2007
IEEE
14 years 4 months ago
Home-Explorer: Search, Localize and Manage the Physical Artifacts Indoors
A new system named Home-Explorer is proposed to search and localize physical artifacts in smart indoor environment. Our view is object-centered and sensors are attached to several...
Bin Guo, Michita Imai
CDC
2009
IEEE
14 years 2 months ago
Multiple-model adaptive control with set-valued observers
— This paper proposes a multiple-model adaptive control methodology, using set-valued observers (MMAC-SVO) for the identification subsystem, that is able to provide robust stabi...
Paulo Andre Nobre Rosa, Carlos Silvestre, Jeff S. ...
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
14 years 2 months ago
Practical Problems with a Cryptographic Protection Scheme
Z is a software system designed to provide media-transparent network services on a collection of UNIX® machines. These services are comprised of file transfer and command executi...
Jonathan M. Smith
FGR
2006
IEEE
154views Biometrics» more  FGR 2006»
14 years 1 months ago
Toward an Efficient and Accurate AAM Fitting on Appearance Varying Faces
Automatic extraction of facial feature deformations (either due to identity change or expression) is a challenging task and could be the base of a facial expression interpretation...
Hugo Mercier, Julien Peyras, Patrice Dalle