Sciweavers

22864 search results - page 4296 / 4573
» An Integrated and
Sort
View
ICCS
2007
Springer
15 years 5 months ago
Building Verifiable Sensing Applications Through Temporal Logic Specification
Abstract. Sensing is at the core of virtually every DDDAS application. Sensing applications typically involve distributed communication and coordination over large self-organized n...
Asad Awan, Ahmed H. Sameh, Suresh Jagannathan, Ana...
GLOBECOM
2009
IEEE
15 years 5 months ago
Coexistence Problem in IEEE 802.22 Wireless Regional Area Networks
IEEE 802.22 wireless regional area network (WRAN) is an emerging cognitive radio-based system. One of the major challenges for WRANs is how to efficiently schedule both channel sen...
Raed T. Al-Zubi, Mohammad Z. Siam, Marwan Krunz
COLCOM
2009
IEEE
15 years 5 months ago
An IT appliance for remote collaborative review of mechanisms of injury to children in motor vehicle crashes
This paper describes the architecture and implementation of a Java-based appliance for collaborative review of crashes involving injured children in order to determine mechanisms o...
Mahendra Kumar, Richard E. Newman, José For...
3DPVT
2004
IEEE
285views Visualization» more  3DPVT 2004»
15 years 5 months ago
Speech-Driven Face Synthesis from 3D Video
This paper presents a framework for speech-driven synthesis of real faces from a corpus of 3D video of a person speaking. Video-rate capture of dynamic 3D face shape and colour ap...
Ioannis A. Ypsilos, Adrian Hilton, Aseel Turkmani,...
ACNS
2004
Springer
85views Cryptology» more  ACNS 2004»
15 years 5 months ago
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
One of the few quantitative metrics used to evaluate the security of a cryptographic file system is the key length of the encryption algorithm; larger key lengths correspond to hig...
Michael E. Locasto, Angelos D. Keromytis
« Prev « First page 4296 / 4573 Last » Next »