Sciweavers

1986 search results - page 377 / 398
» constraints 2006
Sort
View
ICARCV
2006
IEEE
313views Robotics» more  ICARCV 2006»
14 years 3 months ago
GestureCam: A Smart Camera for Gesture Recognition and Gesture-Controlled Web Navigation
– Smart camera, or an intelligent camera, is an embedded vision system which captures and processes image to extract application-specific information in real time. Smart cameras ...
Yu Shi, Ronnie Taib, Serge Lichman
ICDCS
2006
IEEE
14 years 3 months ago
Greedy is Good: On Service Tree Placement for In-Network Stream Processing
This paper is concerned with reducing communication costs when executing distributed user tasks in a sensor network. We take a service-oriented abstraction of sensor networks, whe...
Zoë Abrams, Jie Liu
ICDM
2006
IEEE
176views Data Mining» more  ICDM 2006»
14 years 3 months ago
Razor: mining distance-constrained embedded subtrees
Due to their capability for expressing semantics and relationships among data objects, semi-structured documents have become a common way of representing domain knowledge. Compari...
Henry Tan, Tharam S. Dillon, Fedja Hadzic, Elizabe...
ICNP
2006
IEEE
14 years 3 months ago
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
— In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to t...
Jakob Eriksson, Srikanth V. Krishnamurthy, Michali...
IEEEARES
2006
IEEE
14 years 3 months ago
Modeling permissions in a (U/X)ML world
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Muhammad Alam, Ruth Breu, Michael Hafner