Sciweavers

3751 search results - page 647 / 751
» Events in security protocols
Sort
View
DATE
2006
IEEE
78views Hardware» more  DATE 2006»
15 years 7 months ago
A time-triggered ethernet (TTE) switch
This paper presents the design of a Time-Triggered Ethernet (TTE) Switch, which is one of the core units of the Time-Triggered Ethernet system. Time-triggered Ethernet is a commun...
Klaus Steinhammer, Petr Grillinger, Astrit Ademaj,...
COLT
2000
Springer
15 years 7 months ago
The Role of Critical Sets in Vapnik-Chervonenkis Theory
In the present paper, we present the theoretical basis, as well as an empirical validation, of a protocol designed to obtain effective VC dimension estimations in the case of a si...
Nicolas Vayatis
ICCV
1995
IEEE
15 years 7 months ago
3D Human Body Model Acquisition from Multiple Views
We present a novel motion-based approach for the part determination and shape estimation of a human’s body parts. The novelty of the technique is that neither a prior model of t...
Ioannis A. Kakadiaris, Dimitris N. Metaxas
DIALM
2005
ACM
203views Algorithms» more  DIALM 2005»
15 years 5 months ago
Topological hole detection in wireless sensor networks and its applications
The identification of holes in a wireless sensor network is of primary interest since the breakdown of sensor nodes in a larger area often indicates one of the special events to ...
Stefan Funke
ECTEL
2008
Springer
15 years 5 months ago
A Supporting Architecture for Generic Service Integration in IMS Learning Design
Abstract. Learning Design offers the possibility of capturing the process, activities, user organization and resources used in a learning experience. But a wider set of scenarios a...
Luis de la Fuente Valentín, Yongwu Miao, Ab...