Sciweavers

10412 search results - page 1862 / 2083
» The efficiency of algorithms - misconceptions
Sort
View
PERCOM
2010
ACM
15 years 3 months ago
PerFallD: A pervasive fall detection system using mobile phones
Falls are a major health risk that diminish the quality of life among elderly people. With the elderly population surging, especially with aging "baby boomers", fall dete...
Jiangpeng Dai, Xiaole Bai, Zhimin Yang, Zhaohui Sh...
PR
2010
220views more  PR 2010»
15 years 3 months ago
Online finger-knuckle-print verification for personal authentication
Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...
163
Voted
TPDS
2010
112views more  TPDS 2010»
15 years 3 months ago
Resource Scheduling in Wireless Networks Using Directional Antennas
—Due to a continued increase in the speed and capacities of computing devices, combined with our society’s growing need for mobile communication capabilities, multihop wireless...
Imad Jawhar, Jie Wu, Dharma P. Agrawal
153
Voted
TVCG
2010
157views more  TVCG 2010»
15 years 3 months ago
Crease Surfaces: From Theory to Extraction and Application to Diffusion Tensor MRI
—Crease surfaces are two-dimensional manifolds along which a scalar field assumes a local maximum (ridge) or a local minimum (valley) in a constrained space. Unlike isosurfaces, ...
Thomas Schultz, Holger Theisel, Hans-Peter Seidel
COMPSEC
2010
122views more  COMPSEC 2010»
15 years 2 months ago
Taming role mining complexity in RBAC
In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to rol...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
« Prev « First page 1862 / 2083 Last » Next »