Sciweavers

533 search results - page 34 / 107
» Protocol synthesis from timed and structured specifications
Sort
View
ATAL
2003
Springer
15 years 5 months ago
A configurable mobile agent data protection protocol
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. Specifically, we consider protection mecha...
Paolo Maggi, Riccardo Sisto
ECCV
2002
Springer
16 years 3 months ago
Implicit Probabilistic Models of Human Motion for Synthesis and Tracking
Abstract. This paper addresses the problem of probabilistically modeling 3D human motion for synthesis and tracking. Given the high dimensional nature of human motion, learning an ...
Hedvig Sidenbladh, Michael J. Black, Leonid Sigal
OOPSLA
2004
Springer
15 years 6 months ago
Modeling event driven applications with a specification language (MEDASL)
Radio Frequency Identification (RFID) technology provides the means to track any object, any time, anywhere with Electronic Product Codes (EPC). A major consequence of this techno...
Murali Kaundinya, Ali Syed
WOWMOM
2005
ACM
131views Multimedia» more  WOWMOM 2005»
15 years 6 months ago
Ad-Hoc Extensions to the 802.15.3 MAC Protocol
The paper describes the design and evaluation of AdHoc extensions to the IEEE 802.15.3 Medium Access Control (MAC) layer for Wireless Personal Area Networks (WPANs). The proposed ...
Samir Datta, Ivan Seskar, Mustafa Demirhan, Siun-C...
ICIP
2001
IEEE
16 years 2 months ago
DWT based non-parametric texture modeling
We propose a non-parametric texture modeling and synthesis technique based on the integer version of the Discrete Wavelet Transform (DWT). The successive levels of the DWT pyramid...
Gloria Menegaz