Sciweavers

2826 search results - page 460 / 566
» A resource-based analysis of IT sourcing
Sort
View
3DPVT
2006
IEEE
247views Visualization» more  3DPVT 2006»
15 years 5 months ago
Contour-Based Object Detection in Range Images
This paper presents a novel object recognition approach based on range images. Due to its insensitivity to illumination, range data is well suited for reliable silhouette extracti...
Stefan Stiene, Kai Lingemann, Andreas Nüchter...
ACSAC
2004
IEEE
15 years 5 months ago
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection
Log data adapted for intrusion detection is a little explored research issue despite its importance for successful and efficient detection of attacks and intrusions. This paper pr...
Emilie Lundin Barse, Erland Jonsson
ICPR
2010
IEEE
15 years 5 months ago
PILL-ID: Matching and Retrieval of Drug Pill Imprint Images
—Automatic illicit drug pill matching and retrieval is becoming an important problem due to an increase in the number of tablet type illicit drugs being circulated in our society...
Young-Bum Lee, Unsang Park, Anil Jain
ALGOSENSORS
2004
Springer
15 years 5 months ago
Efficient Delivery of Information in Sensor Networks Using Smart Antennas
In this work we present a new routing protocol for sensor networks that utilizes smart antennas to propagate information about a sensed event towards a receiving center. Our protoc...
Tassos Dimitriou, Antonis Kalis
ANSS
2004
IEEE
15 years 5 months ago
SENS: A Sensor, Environment and Network Simulator
Recent advances in micro electro-mechanical systems and VLSI lithography have enabled the miniaturization of sensors and controllers. Such minitiarization facilitates the deployme...
Sameer Sundresh, WooYoung Kim, Gul Agha