Sciweavers

8479 search results - page 1275 / 1696
» Data Extraction from Web Data Sources
Sort
View
AVSS
2007
IEEE
15 years 11 months ago
Model-based human posture estimation for gesture analysis in an opportunistic fusion smart camera network
In multi-camera networks rich visual data is provided both spatially and temporally. In this paper a method of human posture estimation is described incorporating the concept of a...
Chen Wu, Hamid K. Aghajan
FUZZIEEE
2007
IEEE
15 years 11 months ago
Using Orders of Magnitude and Nominal Variables to Construct Fuzzy Partitions
— The application of Qualitative Reasoning to Learning Algorithms can provide these models with the capability of automate common-sense and expert reasoning. Learning algorithms ...
Cati Olmo, Germán Sánchez, Francesc ...
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 11 months ago
Disruption-Tolerant Routing with Scoped Propagation of Control Information
— We consider the problem of routing messages through a network with episodic connectivity without a priori knowledge of node schedules or locations. We present Steward Assisted ...
Jay Boice, Jose Joaquin Garcia-Luna-Aceves, Katia ...
ICAC
2005
IEEE
15 years 10 months ago
Distributed Stream Management using Utility-Driven Self-Adaptive Middleware
We consider pervasive computing applications that process and aggregate data-streams emanating from highly distributed data sources to produce a stream of updates that have an imp...
Vibhore Kumar, Brian F. Cooper, Karsten Schwan
IH
2005
Springer
15 years 10 months ago
Embedding Covert Channels into TCP/IP
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
Steven J. Murdoch, Stephen Lewis
« Prev « First page 1275 / 1696 Last » Next »