Sciweavers

24529 search results - page 4752 / 4906
» Computing on Authenticated Data
Sort
View
137
Voted
MOBISYS
2005
ACM
16 years 3 months ago
LiveMail: personalized avatars for mobile entertainment
LiveMail is a prototype system that allows mobile subscribers to communicate using personalized 3D face models created from images taken by their phone cameras. The user takes a s...
Miran Mosmondor, Tomislav Kosutic, Igor S. Pandzic
144
Voted
MOBIHOC
2005
ACM
16 years 3 months ago
On the node-scheduling approach to topology control in ad hoc networks
: In this paper, we analyze the node scheduling approach of topology control in the context of reliable packet delivery. In node scheduling, only a minimum set of nodes needed for ...
Budhaditya Deb, Badri Nath
MOBIHOC
2003
ACM
16 years 3 months ago
Connected sensor cover: self-organization of sensor networks for efficient query execution
Spatial query execution is an essential functionality of a sensor network, where a query gathers sensor data within a specific geographic region. Redundancy within a sensor networ...
Himanshu Gupta, Samir R. Das, Quinyi Gu
139
Voted
MOBIHOC
2003
ACM
16 years 3 months ago
The shared wireless infostation model: a new ad hoc networking paradigm (or where there is a whale, there is a way)
In wireless ad hoc networks, capacity can be traded for delay. This tradeoff has been the subject of a number of studies, mainly concentrating on the two extremes: either minimizi...
Tara Small, Zygmunt J. Haas
287
Voted
ACCV
2009
Springer
16 years 2 months ago
Estimating Human Pose from Occluded Images
We address the problem of recovering 3D human pose from single 2D images, in which the pose estimation problem is formulated as a direct nonlinear regression from image observation...
Jia-Bin Huang and Ming-Hsuan Yang
« Prev « First page 4752 / 4906 Last » Next »