Sciweavers

5898 search results - page 1119 / 1180
» Parallel Computing Environments and Methods
Sort
View
JUCS
2010
141views more  JUCS 2010»
15 years 24 days ago
Trust-Oriented Composite Service Selection with QoS Constraints
Abstract: In Service-Oriented Computing (SOC) environments, service clients interact with service providers for consuming services. From the viewpoint of service clients, the trust...
Lei Li, Yan Wang, Ee-Peng Lim
195
Voted
ICIP
2010
IEEE
15 years 9 days ago
Real-time 3D reconstruction and pose estimation for human motion analysis
In this paper, we present a markerless 3D motion capture system based on a volume reconstruction technique of non rigid bodies. It depicts a new approach for pose estimation in or...
Holger Graf, Sang Min Yoon, Cornelius Malerczyk

Publication
145views
14 years 10 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
120
Voted
CIM
2011
171views Hardware» more  CIM 2011»
14 years 9 months ago
Towards Cognitively Plausible Game Playing Systems
We propose to return to the roots of Artificial/Computational Intelligence applicability to board games domain by attempting to mimic human way of playing (or human intelligence ...
Jacek Mandziuk
IHI
2010
143views Healthcare» more  IHI 2010»
14 years 9 months ago
Mining and monitoring patterns of daily routines for assisted living in real world settings
In this paper we demonstrate a fully automated approach for discovering and monitoring patterns of daily activities. Discovering patterns of daily activities and tracking them can...
Parisa Rashidi, Diane J. Cook
« Prev « First page 1119 / 1180 Last » Next »