Sciweavers

7825 search results - page 1388 / 1565
» Physics
Sort
View
RTSS
2006
IEEE
15 years 11 months ago
Voice over Sensor Networks
Wireless sensor networks have traditionally focused on low duty-cycle applications where sensor data are reported periodically in the order of seconds or even longer. This is due ...
Rahul Mangharam, Anthony Rowe, Raj Rajkumar, Ryohe...
SIBGRAPI
2006
IEEE
15 years 11 months ago
Non-Extensive Entropy for CAD Systems of Breast Cancer Images
Recent statistics show that breast cancer is a major cause of death among women in all of the world. Hence, early diagnostic with Computer Aided Diagnosis (CAD) systems is a very ...
Paulo S. Rodrigues, Ruey-Feng Chang, Jasjit S. Sur...
158
Voted
SP
2006
IEEE
109views Security Privacy» more  SP 2006»
15 years 11 months ago
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit “0” into a bi...
Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, R...
ACISP
2006
Springer
15 years 11 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
ACMACE
2006
ACM
15 years 11 months ago
Motion-capture-based avatar control framework in third-person view virtual environments
This paper presents a motion-capture-based control framework for third-person view virtual reality applications. Using motion capture devices, a user can directly control the full...
Masaki Oshita
« Prev « First page 1388 / 1565 Last » Next »