Sciweavers

861 search results - page 60 / 173
» Internal implementation
Sort
View
SAINT
2008
IEEE
15 years 4 months ago
Performance Measurements and Statistics of Tor Hidden Services
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...
VR
2008
IEEE
110views Virtual Reality» more  VR 2008»
15 years 4 months ago
Transparent Cockpit: Visual Assistance System for Vehicle Using Retro-reflective Projection Technology
Camera / Camera For safety and operability of drivers while operating a vehicle, it is very important to obtain a wide field of vision. However, the space available for setting up...
Takumi Yoshida, Kensei Jo, Kouta Minamizawa, Hidea...
ATAL
2007
Springer
15 years 4 months ago
Towards reinforcement learning representation transfer
Transfer learning problems are typically framed as leveraging knowledge learned on a source task to improve learning on a related, but different, target task. Current transfer met...
Matthew E. Taylor, Peter Stone
AVSS
2006
IEEE
15 years 4 months ago
Real-Time Detection of Camera Tampering
This paper presents a novel technique for camera tampering detection. It is implemented in real-time and was developed for use in surveillance and security applications. This meth...
Evan Ribnick, Stefan Atev, Osama Masoud, Nikolaos ...
ICDCSW
2006
IEEE
15 years 4 months ago
Contory: A Smart Phone Middleware Supporting Multiple Context Provisioning Strategies
This paper presents Contory, a middleware specifically deployed to support provisioning of context information on mobile devices such as smart phones. Contory integrates multiple...
Oriana Riva, Cristiano di Flora