Sciweavers

3751 search results - page 647 / 751
» Events in security protocols
Sort
View
DATE
2006
IEEE
78views Hardware» more  DATE 2006»
15 years 1 months ago
A time-triggered ethernet (TTE) switch
This paper presents the design of a Time-Triggered Ethernet (TTE) Switch, which is one of the core units of the Time-Triggered Ethernet system. Time-triggered Ethernet is a commun...
Klaus Steinhammer, Petr Grillinger, Astrit Ademaj,...
COLT
2000
Springer
15 years 1 months ago
The Role of Critical Sets in Vapnik-Chervonenkis Theory
In the present paper, we present the theoretical basis, as well as an empirical validation, of a protocol designed to obtain effective VC dimension estimations in the case of a si...
Nicolas Vayatis
ICCV
1995
IEEE
15 years 1 months ago
3D Human Body Model Acquisition from Multiple Views
We present a novel motion-based approach for the part determination and shape estimation of a human’s body parts. The novelty of the technique is that neither a prior model of t...
Ioannis A. Kakadiaris, Dimitris N. Metaxas
DIALM
2005
ACM
203views Algorithms» more  DIALM 2005»
14 years 12 months ago
Topological hole detection in wireless sensor networks and its applications
The identification of holes in a wireless sensor network is of primary interest since the breakdown of sensor nodes in a larger area often indicates one of the special events to ...
Stefan Funke
ECTEL
2008
Springer
14 years 11 months ago
A Supporting Architecture for Generic Service Integration in IMS Learning Design
Abstract. Learning Design offers the possibility of capturing the process, activities, user organization and resources used in a learning experience. But a wider set of scenarios a...
Luis de la Fuente Valentín, Yongwu Miao, Ab...