Sciweavers

34 search results - page 5 / 7
» itiis 2010
Sort
View
ITIIS
2010
343views more  ITIIS 2010»
14 years 4 months ago
Dynamic Manipulation of a Virtual Object in Marker-less AR system Based on Both Human Hands
This paper presents a novel approach to control the augmented reality (AR) objects robustly in a marker-less AR system by fingertip tracking and hand pattern recognition. It is kn...
Junchul Chun, Byungsung Lee
ITIIS
2010
154views more  ITIIS 2010»
14 years 4 months ago
Research on Anti-Reader Collision Protocols for Integrated RFID-WSNs
Integrated RFID-WSNs (wireless sensor networks) have recently been researched to provide object identities, sensing information, mobile service, and network functionalities. In in...
Doohyun Ko, Bumjin Kim, Sunshin An
ITIIS
2010
247views more  ITIIS 2010»
14 years 4 months ago
An Efficient Overlay for Unstructured P2P File Sharing over MANET using Underlying Cluster-based Routing
In traditional unstructured P2P file sharing network, each peer establishes connections with a certain number of randomly chosen other peers. This would lead to redundant traffic ...
Nadir Shah, Depei Qian
ITIIS
2010
140views more  ITIIS 2010»
14 years 4 months ago
RGF: Receiver-based Greedy Forwarding for Energy Efficiency in Lossy Wireless Sensor Networks
Greedy forwarding is the key mechanism of geographic routing and is one of the protocols used most commonly in wireless sensor networks. Greedy forwarding uses 1-hop local informa...
In Hur, Moonseong Kim, Jaewan Seo, Hyunseung Choo
ITIIS
2010
200views more  ITIIS 2010»
14 years 4 months ago
New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups
Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key...
Kwangsu Lee, Dong Hoon Lee