Sciweavers

13913 search results - page 2516 / 2783
» models 2007
Sort
View
WISTP
2007
Springer
15 years 10 months ago
A New Resilient Key Management Protocol for Wireless Sensor Networks
Wireless Sensor Networks (WSN) security is an important issue which has been investigated by researchers for few years. The most fundamental security problem in WSN is key manageme...
Chakib Bekara, Maryline Laurent-Maknavicius
EUROCRYPT
2005
Springer
15 years 10 months ago
Related-Key Boomerang and Rectangle Attacks
This paper introduces the related-key boomerang and the related-key rectangle attacks. These new attacks can expand the cryptanalytic toolbox, and can be applied to many block ciph...
Eli Biham, Orr Dunkelman, Nathan Keller
3DIM
2007
IEEE
15 years 8 months ago
Examplar-based Shape from Shading
Traditional Shape-from-Shading (SFS) techniques aim to solve an under-constrained problem: estimating depth map from one single image. The results are usually brittle from real im...
Xinyu Huang, Jizhou Gao, Liang Wang, Ruigang Yang
AAIM
2007
Springer
142views Algorithms» more  AAIM 2007»
15 years 8 months ago
Design of a Fuzzy PI Controller to Guarantee Proportional Delay Differentiation on Web Servers
PI controller has attracted researchers in industrial control processes because of its simplicity and robust performance in a wide range of operating conditions. It has been used t...
Ka Ho Chan, Xiaowen Chu
ACCV
2007
Springer
15 years 8 months ago
Statistical Framework for Shot Segmentation and Classification in Sports Video
In this paper, a novel statistical framework is proposed for shot segmentation and classification. The proposed framework segments and classifies shots simultaneously using same di...
Ying Yang, Shouxun Lin, Yongdong Zhang, Sheng Tang
« Prev « First page 2516 / 2783 Last » Next »