Sciweavers

10899 search results - page 2010 / 2180
» Wide Area Computation
Sort
View
IJSNET
2008
118views more  IJSNET 2008»
15 years 4 months ago
Public key cryptography empowered smart dust is affordable
: Public key cryptography (PKC) has been considered for a long time to be computationally too expensive for small battery powered devices. However, PKC turned out to be very benefi...
Steffen Peter, Peter Langendörfer, Krzysztof ...
177
Voted
IJDAR
2006
245views more  IJDAR 2006»
15 years 4 months ago
Object count/area graphs for the evaluation of object detection and segmentation algorithms
Evaluation of object detection algorithms is a non-trivial task: a detection result is usually evaluated by comparing the bounding box of the detected object with the bounding box...
Christian Wolf, Jean-Michel Jolion
CVIU
2007
137views more  CVIU 2007»
15 years 4 months ago
Visual learning of texture descriptors for facial expression recognition in thermal imagery
Facial expression recognition is an active research area that finds a potential application in human emotion analysis. This work presents an illumination independent approach for...
Benjamín Hernández, Gustavo Olague, ...
JOT
2008
114views more  JOT 2008»
15 years 4 months ago
By students, for students: a production-quality multimedia library and its application to game-based teaching
The attractive idea of using game development for teaching programming can only meet student expectations and modern software engineering requirements if it uses advanced multimed...
Till G. Bay, Michela Pedroni, Bertrand Meyer
JCO
2006
106views more  JCO 2006»
15 years 4 months ago
Reliable Ad Hoc Routing Based on Mobility Prediction
Reliability is a very important issue in Mobile Ad hoc NETworks (MANETs). Shortest paths are usually used to route packets in MANETs. However, a shortest path may fail quickly, bec...
Jian Tang, Guoliang Xue, Weiyi Zhang
« Prev « First page 2010 / 2180 Last » Next »