Sciweavers

1834 search results - page 360 / 367
» Public Key Cryptography
Sort
View
PAMI
2006
187views more  PAMI 2006»
14 years 11 months ago
An Experimental Study on Pedestrian Classification
Detecting people in images is key for several important application domains in computer vision. This paper presents an in-depth experimental study on pedestrian classification; mul...
Stefan Munder, Dariu M. Gavrila
IJRR
2007
236views more  IJRR 2007»
14 years 11 months ago
Towards High-resolution Imaging from Underwater Vehicles
Large area mapping at high resolution underwater continues to be constrained by sensor-level environmental constraints and the mismatch between available navigation and sensor acc...
Hanumant Singh, Christopher N. Roman, Oscar Pizarr...
IJRR
2007
104views more  IJRR 2007»
14 years 11 months ago
Deep Space Formation Flying Spacecraft Path Planning
Efficient algorithms for collision-free energy sub-optimal path planning for formations of spacecraft flying in deep space are presented. The idea is to introduce a set of way-poi...
Cornel Sultan, Sanjeev Seereeram, Raman K. Mehra
IJWBC
2007
90views more  IJWBC 2007»
14 years 11 months ago
Salutogenic community building
This paper explores a new approach to community building. It is based on the concept of salutogenesis; a proactive approach to community health which seeks preventative measures i...
Khamphira Viravong
TC
2008
14 years 11 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park