Sciweavers

1709 search results - page 298 / 342
» Precise Modeling of Design Patterns
Sort
View
JUCS
2008
113views more  JUCS 2008»
14 years 11 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
TCOM
2008
192views more  TCOM 2008»
14 years 11 months ago
Joint source coding, routing and power allocation in wireless sensor networks
This paper proposes a cross-layer optimization framework for the wireless sensor networks. In a wireless sensor network, each sensor makes a local observation of the underlying phy...
Jun Yuan, Wei Yu
ICWS
2010
IEEE
14 years 9 months ago
An Approach for Context-Aware Service Discovery and Recommendation
Given the large amount of existing services and the diversified needs nowadays, it is time-consuming for end-users to find appropriate services. To help end-users obtain their desi...
Hua Xiao, Ying Zou, Joanna Ng, Leho Nigul
CVPR
2011
IEEE
14 years 6 months ago
Stable Multi-Target Tracking in Real-Time Surveillance Video
The majority of existing pedestrian trackers concentrate on maintaining the identities of targets, however systems for remote biometric analysis or activity recognition in surveill...
Ben Benfold and Ian Reid
ICCSA
2004
Springer
15 years 5 months ago
Molecular Simulation of Reaction and Adsorption in Nanochemical Devices: Increase of Reaction Conversion by Separation of a Prod
We present a novel simulation tool to study fluid mixtures that are simultaneously chemically reacting and adsorbing within a molecularly porous material. The method is a combinat...
William R. Smith, Martin Lísal