Sciweavers

623 search results - page 63 / 125
» Does personality matter
Sort
View
ISW
2009
Springer
15 years 7 months ago
Robust Authentication Using Physically Unclonable Functions
Abstract. In this work we utilize a physically unclonable function (PUF) to improve resilience of authentication protocols to various types of compromise. As an example application...
Keith B. Frikken, Marina Blanton, Mikhail J. Atall...
101
Voted
ACCV
2007
Springer
15 years 7 months ago
Human Pose Estimation from Volume Data and Topological Graph Database
This paper proposes a novel volume-based motion capture method using a bottom-up analysis of volume data and an example topology database of the human body. By using a two-step gra...
Hidenori Tanaka, Atsushi Nakazawa, Haruo Takemura
94
Voted
ICOIN
2007
Springer
15 years 7 months ago
Collision-Free Downlink Scheduling in the IEEE 802.15.4 Network
Abstract. IEEE 802.15.4 is the Low-Rate Wireless Personal Area Network (LR-WPAN) standard that is suitable for wireless sensor networks and wireless home networks among others. The...
Sangki Yun, Hyogon Kim
114
Voted
UCS
2007
Springer
15 years 6 months ago
DroPicks - A Tool for Collaborative Content Sharing Exploiting Everyday Artefacts
Emergence of social web services like YouTube[1], Flickr[2] etc. is constantly transforming the way we share our lifestyles with family, friends and colleagues. The significance of...
Simo Hosio, Fahim Kawsar, Jukka Riekki, Tatsuo Nak...
88
Voted
INFOCOM
2006
IEEE
15 years 6 months ago
Stimulating Participation in Wireless Community Networks
—Wireless Community Networks (WCNs) are wide-area wireless networks whose nodes are owned and managed by volunteers. We focus on the provision of Internet access to mobile users ...
Elias C. Efstathiou, Pantelis A. Frangoudis, Georg...