Sciweavers

319 search results - page 64 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
CORR
2010
Springer
257views Education» more  CORR 2010»
13 years 2 months ago
Survey on Various Gesture Recognition Techniques for Interfacing Machines Based on Ambient Intelligence
Gesture recognition is mainly apprehensive on analyzing the functionality of human wits. The main goal of gesture recognition is to create a system which can recognize specific hu...
Harshith C, Karthik R. Shastry, Manoj Ravindran, M...
ICDE
2011
IEEE
235views Database» more  ICDE 2011»
12 years 9 months ago
Dealing proactively with data corruption: Challenges and opportunities
—The danger of production or backup data becoming corrupted is a problem that database administrators dread. This position paper aims to bring this problem to the attention of th...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
ICC
2011
IEEE
239views Communications» more  ICC 2011»
12 years 5 months ago
The Insights of DV-Based Localization Algorithms in the Wireless Sensor Networks with Duty-Cycled and Radio Irregular Sensors
—Location information of nodes is the basis for many applications in wireless sensor networks (WSNs). However, most previous localization methods make the unrealistic assumption:...
Yuanfang Chen, Lei Shu, Mingchu Li, Ziqi Fan, Lei ...
SWAT
1998
Springer
110views Algorithms» more  SWAT 1998»
13 years 9 months ago
On the Number of Regular Vertices of the Union of Jordan Regions
Let C be a collection of n Jordan regions in the plane in general position, such that each pair of their boundaries intersect in at most s points, where s is a constant. Let U den...
Boris Aronov, Alon Efrat, Dan Halperin, Micha Shar...