Sciweavers

490 search results - page 89 / 98
» Modeling Human Decision Making in Cliff-Edge Environments
Sort
View
FLAIRS
2006
14 years 11 months ago
Design, Implementation and Performance Analysis of Pervasive Surveillance Networks
Pervasive surveillance implies the continuous tracking of multiple targets as they move about the monitored region. The tasks to be performed by a surveillance system are expresse...
Amit Goradia, Zhiwei Cen, Clayton Haffner, Ning Xi...
DL
1999
Springer
181views Digital Library» more  DL 1999»
15 years 1 months ago
Quality of OCR for Degraded Text Images
Commercial OCR packages work best with highquality scanned images. They often produce poor results when the image is degraded, either because the original itself was poor quality,...
Roger T. Hartley, Kathleen Crumpton
ECAI
2008
Springer
14 years 11 months ago
A BDD Approach to the Feature Subscription Problem
Modern feature-rich telecommunications services offer significant opportunities to human users. To make these services more usable, facilitating personalisation is very important s...
Tarik Hadzic, David Lesaint, Deepak Mehta, Barry O...
CATA
2010
14 years 11 months ago
Finding Good Paths: Applications of Least Cost Caloric Path Computations
As you walk around during your daily life, you commonly make path finding decisions based on the world around you. For example, when you are walking in the outdoors, you take the ...
Zoë J. Wood, Greg Hoffman, Mark Wazny
JCP
2007
122views more  JCP 2007»
14 years 9 months ago
Converting Group Key Agreement Protocol into Password-Based Setting - Case Study
Abstract— Converting a secure group key agreement protocol into password-based setting is not a trivial task. The security of a password-based scheme hinges on preventing diction...
Ratna Dutta