Sciweavers

133 search results - page 21 / 27
» Exploiting Reference Interaction In Resolving Temporal Refer...
Sort
View
INFOCOM
2008
IEEE
15 years 6 months ago
Attack-Tolerant Time-Synchronization in Wireless Sensor Networks
—Achieving secure time-synchronization in wireless sensor networks (WSNs) is a challenging, but very important problem that has not yet been addressed effectively. This paper pro...
Xin Hu, Taejoon Park, Kang G. Shin
FORTE
2009
14 years 9 months ago
A Model-Checking Approach for Service Component Architectures
We present a strategy for model-checking the correctness of service composition. We do so in the context of SRML, a formal modelling framework for service-oriented computing being ...
João Abreu, Franco Mazzanti, José Lu...
GW
2009
Springer
195views Biometrics» more  GW 2009»
14 years 9 months ago
Continuous Realtime Gesture Following and Recognition
Abstract. We present a HMM based system for real-time gesture analysis. The system outputs continuously parameters relative to the gesture time progression and its likelihood. Thes...
Frédéric Bevilacqua, Bruno Zamborlin...
ACMSE
2005
ACM
15 years 5 months ago
The bipartite clique: a topological paradigm for WWWeb user search customization
Web user search customization research has been fueled by the recognition that if the WWW is to attain to its optimal potential as an interactive medium the development of new and...
Brenda F. Miles, Vir V. Phoha
FOIS
2006
15 years 1 months ago
Simultaneous Events and the "Once-Only" Effect
Abstract. Some events recur, and some happen only once. Galton refers to the latter as "once-only" events [1]. In a first-order logic of events that makes a type-token di...
Haythem O. Ismail