Sciweavers

13180 search results - page 2480 / 2636
» Network Models
Sort
View
136
Voted
DAIS
2006
15 years 4 months ago
Mobile Process Description and Execution
Abstract. Mobile devices are increasingly aware of their respective locations and vicinity and tend to communicate rather loosely with each other; therefore asynchronous communicat...
Christian P. Kunze, Sonja Zaplata, Winfried Lamers...
118
Voted
EUROIMSA
2006
116views Multimedia» more  EUROIMSA 2006»
15 years 4 months ago
Guidelines for Selecting Practical MPEG Group of Pictures
The repeated pattern of I, P and B frames in an MPEG stream is known as the Group of Pictures (GOP). Current GOP choices are made using intuition and informal guidelines without t...
Huahui Wu, Mark Claypool, Robert E. Kinicki
151
Voted
FLAIRS
2006
15 years 4 months ago
Some Second Order Effects on Interval Based Probabilities
In real-life decision analysis, the probabilities and values of consequences are in general vague and imprecise. One way to model imprecise probabilities is to represent a probabi...
David Sundgren, Mats Danielson, Love Ekenberg
151
Voted
ICISC
2004
146views Cryptology» more  ICISC 2004»
15 years 4 months ago
Identity Based Threshold Ring Signature
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n - t entities to generate a publicly verifiable t-out-of-n signature on behalf of ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...
IJIT
2004
15 years 4 months ago
Morphing Human Faces: Automatic Control Points Selection And Color Transition
In this paper, we propose a morphing method by which face color images can be freely transformed. The main focus of this work is the transformation of one face image to another. Th...
Stephen Karungaru, Minoru Fukumi, Norio Akamatsu
« Prev « First page 2480 / 2636 Last » Next »