Sciweavers

1940 search results - page 386 / 388
» Process as Theory in Information Systems Research
Sort
View
IPSN
2007
Springer
15 years 3 months ago
Exact distributed Voronoi cell computation in sensor networks
Distributed computation of Voronoi cells in sensor networks, i.e. computing the locus of points in a sensor field closest to a given sensor, is a key building block that supports...
Boulat A. Bash, Peter Desnoyers
IAT
2006
IEEE
15 years 3 months ago
Trust Negotiations with Customizable Anonymity
Trust negotiation makes it possible for two parties to carry on secure transactions by first establishing trust through a bilateral, iterative process of requesting and disclosin...
Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantz...
ICMI
2003
Springer
166views Biometrics» more  ICMI 2003»
15 years 2 months ago
Georgia tech gesture toolkit: supporting experiments in gesture recognition
Gesture recognition is becoming a more common interaction tool in the fields of ubiquitous and wearable computing. Designing a system to perform gesture recognition, however, can...
Tracy L. Westeyn, Helene Brashear, Amin Atrash, Th...
CVRMED
1997
Springer
15 years 1 months ago
Rigid registration of CT, MR and cryosection images using a GLCM framework
The majority of the available rigid registration measures are based on a 2-dimensional histogram of corresponding grey-values in the registered images. This paper shows that these ...
Morten Bro-Nielsen
FC
2006
Springer
129views Cryptology» more  FC 2006»
15 years 1 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig