Sciweavers

601 search results - page 93 / 121
» Verifiable Network-Performance Measurements
Sort
View
PERVASIVE
2008
Springer
14 years 10 months ago
A fair and energy-efficient topology control protocol for wireless sensor networks
In energy constrained wireless sensor networks, energy conservation techniques are to be applied in order to maximize the system lifetime. We tackle the problem of increasing netw...
Rami Mochaourab, Waltenegus Dargie
94
Voted
IJCV
2007
189views more  IJCV 2007»
14 years 10 months ago
Prior-based Segmentation and Shape Registration in the Presence of Perspective Distortion
Challenging object detection and segmentation tasks can be facilitated by the availability of a reference object. However, accounting for possible transformations between the diff...
Tammy Riklin-Raviv, Nahum Kiryati, Nir A. Sochen
102
Voted
IJNSEC
2007
164views more  IJNSEC 2007»
14 years 10 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
TCSV
2008
175views more  TCSV 2008»
14 years 10 months ago
Expandable Data-Driven Graphical Modeling of Human Actions Based on Salient Postures
This paper presents a graphical model for learning and recognizing human actions. Specifically, we propose to encode actions in a weighted directed graph, referred to as action gra...
Wanqing Li, Zhengyou Zhang, Zicheng Liu
COLING
2002
14 years 10 months ago
Automatic Text Categorization using the Importance of Sentences
Automatic text categorization is a problem of automatically assigning text documents to predefined categories. In order to classify text documents, we must extract good features f...
Youngjoong Ko, Jinwoo Park, Jungyun Seo