Sciweavers

1050 search results - page 65 / 210
» Two methods of authenticated positioning
Sort
View
CASES
2003
ACM
15 years 5 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
CHI
2002
ACM
16 years 6 days ago
SmartSkin: an infrastructure for freehand manipulation on interactive surfaces
This paper introduces a new sensor architecture for making interactive surfaces that are sensitive to human hand and finger gestures. This sensor recognizes multiple hand position...
Jun Rekimoto
SMI
2006
IEEE
144views Image Analysis» more  SMI 2006»
15 years 5 months ago
Robust Alignment of Multi-view Range Data to CAD Model
Surface matching is a common task in computer graphics and computer vision. In this paper, we introduce a novel algorithm that aligns scanned point-based surfaces to the related 3...
Xinju Li, Igor Guskov, Jacob Barhak
IJCNLP
2004
Springer
15 years 5 months ago
Detection of Incorrect Case Assignments in Paraphrase Generation
Abstract. This paper addresses the issue of post-transfer process in paraphrasing. Our previous investigation into transfer errors revealed that case assignment tends to be incorre...
Atsushi Fujita, Kentaro Inui, Yuji Matsumoto
AAAI
2004
15 years 1 months ago
A General Solution to the Graph History Interaction Problem
Since the state space of most games is a directed graph, many game-playing systems detect repeated positions with a transposition table. This approach can reduce search effort by ...
Akihiro Kishimoto, Martin Müller 0003