Sciweavers

2609 search results - page 470 / 522
» Models for Global Constraint Applications
Sort
View
WOWMOM
2006
ACM
195views Multimedia» more  WOWMOM 2006»
15 years 5 months ago
Can I Add a Secure VoIP Call?
— Voice over IP is a major trend in applications for wireless networks, but even so it is not immune to the risks usually related with IP networks. Proposed solutions for VoIP se...
Arlen Nascimento, Alexandre Passito, Edjair de Sou...
CVPR
2010
IEEE
15 years 5 months ago
Simultaneous surveillance camera calibration and foot-head homology estimation from human detections
We propose a novel method for automatic camera calibration and foot-head homology estimation by observing persons standing at several positions in the camera field of view. We de...
Branislav Micusik, Tomas Pajdla
ISPW
2005
IEEE
15 years 5 months ago
Automatically Analyzing Software Processes: Experience Report
Sound methods of analysis and comparison of software processes are crucial for such tasks as process understanding, process correctness verification, evolution management, proces...
Rodion M. Podorozhny, Dewayne E. Perry, Leon J. Os...
SASN
2005
ACM
15 years 5 months ago
A key pre-distribution scheme for secure sensor networks using probability density function of node deployment
Pairwise key establishment is a fundamental service provided in secure sensor networks. However, due to resource constraints, establishing pairwise keys is not a trivial task. Rec...
Takashi Ito, Hidenori Ohta, Nori Matsuda, Takeshi ...
ATAL
2005
Springer
15 years 5 months ago
The use of emotions to create believable agents in a virtual environment
In the past emotions have been dismissed as a distraction to the logical, scientific thought process. More recently however, the importance of emotion in human-like intelligence a...
Karthi Selvarajah, Debbie Richards