Sciweavers

24132 search results - page 4764 / 4827
» and 2009
Sort
View
CORR
2009
Springer
137views Education» more  CORR 2009»
14 years 7 months ago
Choreographies with Secure Boxes and Compromised Principals
We equip choreography-level session descriptions with a simple abstraction of a security infrastructure. Message components may be enclosed within (possibly nested) "boxes&quo...
Marco Carbone, Joshua D. Guttman
CORR
2009
Springer
242views Education» more  CORR 2009»
14 years 7 months ago
Adaptive Scheduling of Data Paths using Uppaal Tiga
Abstract. We apply Uppaal Tiga to automatically compute adaptive scheduling strategies for an industrial case study dealing with a state-of-the-art image processing pipeline of a p...
Israa AlAttili, Fred Houben, Georgeta Igna, Steffe...
CSE
2009
IEEE
14 years 7 months ago
The Use of Online Videos in the 2008 U.S. Congressional Elections
With 39% of Americans admitting the use of the Web to get unfiltered campaign materials, it becomes important to evaluate how they are searching for these materials and what they a...
Eni Mustafaraj, Panagiotis Takis Metaxas, Catherin...
DAGM
2009
Springer
14 years 7 months ago
Combined GKLT Feature Tracking and Reconstruction for Next Best View Planning
Abstract. Guided Kanade-Lucas-Tomasi (GKLT) tracking is a suitable way to incorporate knowledge about camera parameters into the standard KLT tracking approach for feature tracking...
Michael Trummer, Christoph Munkelt, Joachim Denzle...
DCOSS
2009
Springer
14 years 7 months ago
Empirical Evaluation of Wireless Underground-to-Underground Communication in Wireless Underground Sensor Networks
Abstract. Many applications for irrigation management and environment monitoring exploit buried sensors wired-connected to the soil surface for information retrieval. Wireless Unde...
Agnelo R. Silva, Mehmet C. Vuran
« Prev « First page 4764 / 4827 Last » Next »