Sciweavers

919 search results - page 180 / 184
» Evaluation of an Approach to Expertise Finding
Sort
View
CORR
2010
Springer
175views Education» more  CORR 2010»
14 years 9 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
CORR
2008
Springer
98views Education» more  CORR 2008»
14 years 9 months ago
The Physical World as a Virtual Reality
This paper explores the idea that the universe is a virtual reality created by information processing, and relates this strange idea to the findings of modern physics about the ph...
Brian Whitworth
IJSNET
2008
118views more  IJSNET 2008»
14 years 9 months ago
Public key cryptography empowered smart dust is affordable
: Public key cryptography (PKC) has been considered for a long time to be computationally too expensive for small battery powered devices. However, PKC turned out to be very benefi...
Steffen Peter, Peter Langendörfer, Krzysztof ...
IJCV
2006
171views more  IJCV 2006»
14 years 9 months ago
Combining Generative and Discriminative Models in a Framework for Articulated Pose Estimation
We develop a method for the estimation of articulated pose, such as that of the human body or the human hand, from a single (monocular) image. Pose estimation is formulated as a s...
Rómer Rosales, Stan Sclaroff
IJES
2006
110views more  IJES 2006»
14 years 9 months ago
Partitioning bin-packing algorithms for distributed real-time systems
Embedded real-time systems must satisfy not only logical functional requirements but also para-functional properties such as timeliness, Quality of Service (QoS) and reliability. W...
Dionisio de Niz, Raj Rajkumar