Sciweavers

5600 search results - page 984 / 1120
» Synthesizing robust systems
Sort
View
ICISC
2004
127views Cryptology» more  ICISC 2004»
15 years 2 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
119
Voted
ICVGIP
2004
15 years 2 months ago
Multi-Cue Exemplar-Based Nonparametric Model for Gesture Recognition
This paper presents an approach for a multi-cue, viewbased recognition of gestures. We describe an exemplarbased technique that combines two different forms of exemplars - shape e...
Vinay D. Shet, V. Shiv Naga Prasad, Ahmed M. Elgam...
138
Voted
DICTA
2003
15 years 2 months ago
3D Face Recognition Using Longitudinal Section and Transection
In this paper, a new practical implementation of a person verification system using features of longitudinal section and transection and other facial, rotation compensated 3D face ...
Yeung-hak Lee
88
Voted
IAAI
2001
15 years 2 months ago
Token Allocation Strategy for Free-Flight Conflict Solving
For the last 10 years, airlines have widely supported research on the development of airspaces where aircraft would be free to decide their trajectory: these areas where called Fr...
Géraud Granger, Nicolas Durand, Jean-Marc A...
OPODIS
2004
15 years 2 months ago
Comparison of Failures and Attacks on Random and Scale-Free Networks
Abstract. It appeared recently that some statistical properties of complex networks like the Internet, the World Wide Web or Peer-to-Peer systems have an important influence on the...
Jean-Loup Guillaume, Matthieu Latapy, Cléme...