Sciweavers

4815 search results - page 766 / 963
» A Pattern Approach to Modeling the Provider Selection Proble...
Sort
View
FGR
2008
IEEE
117views Biometrics» more  FGR 2008»
15 years 11 months ago
Complex human motion estimation using visibility
This paper presents a novel algorithm for estimating complex human motion from 3D video. We base our algorithm on a model-based approach which uses a complete surface mesh of a 3D...
Tomoyuki Mukasa, Arata Miyamoto, Shohei Nobuhara, ...
EPEW
2007
Springer
15 years 10 months ago
Evaluation of P2P Search Algorithms for Discovering Trust Paths
Abstract. Distributed security models based on a ‘web of trust’ eliminate single points of failure and alleviate performance bottlenecks. However, such distributed approaches r...
Emerson Ribeiro de Mello, Aad P. A. van Moorsel, J...
UM
2007
Springer
15 years 10 months ago
Respecting Users' Individual Privacy Constraints in Web Personalization
Web personalization has demonstrated to be advantageous for both online customers and vendors. However, its benefits may be severely counteracted by privacy constraints. Personaliz...
Yang Wang 0005, Alfred Kobsa
ICPP
2006
IEEE
15 years 10 months ago
Social Welfare Based Routing in Ad hoc Networks
— Due to resource scarcity, a paramount concern in ad hoc networks is to utilize the limited resources efficiently. The self-organized nature of ad hoc networks makes the social...
Mingming Lu, Jie Wu
CASSIS
2005
Springer
15 years 10 months ago
The Design of Application-Tailorable Operating System Product Lines
System software for deeply embedded devices has to cope with a broad variety of requirements and platforms, but especially with strict resource constraints. To compete against prop...
Daniel Lohmann, Wolfgang Schröder-Preikschat,...