Sciweavers

5417 search results - page 579 / 1084
» Simulation Optimization: Methods and Applications
Sort
View
162
Voted
ICCV
2011
IEEE
14 years 3 months ago
Stereo Time-of-Flight
This paper describes a novel method to acquire depth images using a pair of ToF (Time of Flight) cameras. As opposed to approaches that filter, calibrate or do 3D reconstructions...
Victor Castañeda, Diana Mateus, Nassir Navab
LCN
2003
IEEE
15 years 9 months ago
Regional Gossip Routing for Wireless Ad Hoc Networks
Abstract—Many routing protocols have been proposed for wireless ad hoc networks, and most of them are based on some variants of flooding. Thus many routing messages are propagat...
Xiang-Yang Li, Kousha Moaveninejad, Ophir Frieder
152
Voted
SFM
2005
Springer
243views Formal Methods» more  SFM 2005»
15 years 9 months ago
Hermes: Agent-Based Middleware for Mobile Computing
Hermes is a middleware system for design and execution of activity-based applications in distributed environments. It supports mobile computation as an application implementation s...
Flavio Corradini, Emanuela Merelli
122
Voted
ICDE
2006
IEEE
143views Database» more  ICDE 2006»
15 years 9 months ago
Application-aware Overlay Networks for Data Dissemination
XPORT (eXtensible Profile-driven Overlay Routing Trees) is a generic data dissemination system that supports an extensible set of data types and profiles, and an optimization fr...
Olga Papaemmanouil, Yanif Ahmad, Ugur Çetin...
167
Voted
BIOSIG
2003
145views Biometrics» more  BIOSIG 2003»
15 years 5 months ago
Pass Phrase Based Speaker Recognition for Authentication
: Speaker recognition in applications of our daily lives is not yet in widespread use. In order for biometric technology to make sense for real-world authentication applications an...
Heinz Hertlein, Robert Frischholz, Elmar Nöth