Sciweavers

6960 search results - page 969 / 1392
» Continuity Analysis of Programs
Sort
View
ICASSP
2008
IEEE
15 years 11 months ago
Hybrid feature selection for gesture recognition using support vector machines
This paper presents an approach for a multi-cue based two-dimensional gesture recognition that combines two different forms of cues, namely shape cues and motion cues, in a suppor...
Yu Yuan, Kenneth Barner
ICDM
2008
IEEE
179views Data Mining» more  ICDM 2008»
15 years 11 months ago
Detection and Exploration of Outlier Regions in Sensor Data Streams
Sensor networks play an important role in applications concerned with environmental monitoring, disaster management, and policy making. Effective and flexible techniques are need...
Conny Franke, Michael Gertz
ICSM
2008
IEEE
15 years 11 months ago
Traceability for the maintenance of secure software
Traceability links among different software engineering artifacts make explicit how a software system was implemented to accommodate its requirements. For secure and dependable so...
Yijun Yu, Jan Jürjens, John Mylopoulos
INFOCOM
2008
IEEE
15 years 11 months ago
Association Control in Mobile Wireless Networks
—As mobile nodes roam in a wireless network, they continuously associate with different access points and perform handoff operations. However, these handoffs can potentially incu...
Minkyong Kim, Zhen Liu, Srinivasan Parthasarathy 0...
SECON
2008
IEEE
15 years 11 months ago
A Three-Tier Framework for Intruder Information Sharing in Sensor Networks
—In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, det...
Bin Tong, Santosh Panchapakesan, Wensheng Zhang