Sciweavers

291 search results - page 43 / 59
» Enforceable social laws
Sort
View
MTA
2011
336views Hardware» more  MTA 2011»
14 years 4 months ago
SCface - surveillance cameras face database
In this paper we describe a database of static images of human faces. Images were taken in uncontrolled indoor environment using five video surveillance cameras of various qualitie...
Mislav Grgic, Kresimir Delac, Sonja Grgic
TMC
2011
164views more  TMC 2011»
14 years 4 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
JDCTA
2010
171views more  JDCTA 2010»
14 years 4 months ago
Computer Interaction System using Hand Posture Identification
Natural and friendly interface is critical for the development of service robots. Gesture-based interface offers a way to enable untrained users to interact with robots more easil...
Sushma D. Ghode, S. A. Chhabria, R. V. Dharaskar
80
Voted
INFOCOM
2011
IEEE
14 years 26 days ago
Identifying mobiles hiding behind wireless routers
—The network address translation technique (NAT) is widely used in wireless routers. It is a low cost solution to IPv4 address space limitations. However, cyber criminals may abu...
Yinjie Chen, Zhongli Liu, Benyuan Liu, Xinwen Fu, ...
KDD
2008
ACM
142views Data Mining» more  KDD 2008»
15 years 10 months ago
Weighted graphs and disconnected components: patterns and a generator
The vast majority of earlier work has focused on graphs which are both connected (typically by ignoring all but the giant connected component), and unweighted. Here we study numer...
Mary McGlohon, Leman Akoglu, Christos Faloutsos