Sciweavers

2250 search results - page 396 / 450
» Authorizing applications in singularity
Sort
View
GLOBECOM
2006
IEEE
15 years 3 months ago
Progressive Accumulative Routing in Wireless Networks
This paper considers a sensor network where relay nodes cooperate in order to minimize the total energy consumption for the unicast transmission of a message from a single source ...
Raymond Yim, Neelesh B. Mehta, Andreas F. Molisch,...
ISESE
2006
IEEE
15 years 3 months ago
An industrial case study of structural testing applied to safety-critical embedded software
Effective testing of safety-critical real-time embedded software is difficult and expensive. Many companies are hesitant about the cost of formalized criteria-based testing and a...
Jing Guan, Jeff Offutt, Paul Ammann
SIBGRAPI
2006
IEEE
15 years 3 months ago
Dealing with Multi-Scale Depth Changes and Motion in Depth Edge Detection
Sharp discontinuities in depth, or depth edges, are very important low-level features for scene understanding. Recently, we have proposed a solution to the depth edge detection pr...
Rogerio Feris, Matthew Turk, Ramesh Raskar
ACMDIS
2006
ACM
15 years 3 months ago
Morphome: a constructive field study of proactive information technology in the home
This paper presents the main results of a three-year long field and design study of proactive information technology in the home. This technology uses sensors to track human activ...
Ilpo Koskinen, Kristo Kuusela, Katja Battarbee, An...
MM
2006
ACM
189views Multimedia» more  MM 2006»
15 years 3 months ago
Real-time computerized annotation of pictures
Automated annotation of digital pictures has been a highly challenging problem for computer scientists since the invention of computers. The capability of annotating pictures by c...
Jia Li, James Ze Wang