Sciweavers

12131 search results - page 12 / 2427
» Introduction to Modeling and Simulation
Sort
View
ICISC
2001
156views Cryptology» more  ICISC 2001»
14 years 11 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
ISORC
2008
IEEE
15 years 4 months ago
Structural Model of Real-Time Databases: An Illustration
A real-time database is a database in which both the data and the operations upon the data may have timing constraints. The design of this kind of database requires the introducti...
Nizar Idoudi, Claude Duvallet, Bruno Sadeg, Rafik ...
CVPR
2004
IEEE
15 years 12 months ago
Pointwise Motion Tracking in Echocardiographic Images
In this paper, we study the problem of pointwise motion tracking in echocardiographic images. We show that decorrelation between tissue motion and intensity variation is inevitabl...
Weichuan Yu, Ping Yan, Albert J. Sinusas, Karl Thi...
ICANNGA
2007
Springer
110views Algorithms» more  ICANNGA 2007»
15 years 4 months ago
Genetic Programming for Proactive Aggregation Protocols
Abstract. We present an approach for automated generation of proactive aggregation protocols using Genetic Programming. First a short introduction into aggregation and proactive pr...
Thomas Weise, Kurt Geihs, Philipp A. Baer
CVPR
1997
IEEE
15 years 2 months ago
Uncalibrated 1D projective camera and 3D affine reconstruction of lines
We describe a linear algorithm to recover 30 afJine slzape/niotionfrom line correspondences over three views with uncalibrated afine cameras. The key idea is the introduction of a...
Long Quan