Sciweavers

502 search results - page 71 / 101
» Deploying a New Hash Algorithm
Sort
View
152
Voted
ICIP
2010
IEEE
14 years 9 months ago
Real-time 3D reconstruction and pose estimation for human motion analysis
In this paper, we present a markerless 3D motion capture system based on a volume reconstruction technique of non rigid bodies. It depicts a new approach for pose estimation in or...
Holger Graf, Sang Min Yoon, Cornelius Malerczyk
IPPS
2010
IEEE
14 years 9 months ago
Distributed advance network reservation with delay guarantees
New architectures have recently been proposed and deployed to support end-to-end advance reservation of network resources. These architectures rely on the use a centralized schedul...
Niloofar Fazlollahi, David Starobinski
VL
2009
IEEE
175views Visual Languages» more  VL 2009»
15 years 6 months ago
TurKit: Tools for iterative tasks on mechanical turk
Mechanical Turk (MTurk) is an increasingly popular web service for paying people small rewards to do human computation tasks. Current uses of MTurk typically post independent para...
Greg Little, Lydia B. Chilton, Max Goldman, Robert...
ISM
2008
IEEE
98views Multimedia» more  ISM 2008»
15 years 6 months ago
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to ...
William Conner, Klara Nahrstedt
SECURWARE
2008
IEEE
15 years 6 months ago
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks
Mobile ad hoc networking is an operating mode for rapid mobile host interconnection, where nodes rely on each other, in order to maintain network connectivity and functionality. S...
Ioannis G. Askoxylakis, Damien Sauveron, Constanti...