We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 164 results
  1. Basic Methods

    Organic Computing is a systems science. It deals with the integration of system components and whole subsystems into larger and well-organised...
    Chapter 2017
  2. A distributed in-memory key-value store system on heterogeneous CPU–GPU cluster

    In-memory key-value stores play a critical role in many data-intensive applications to provide high-throughput and low latency data accesses....

    Kai Zhang, Kaibo Wang, ... Bei Hua in The VLDB Journal
    Article 21 August 2017
  3. Global Localization and Orientation of the Cervical Spine in X-ray Images

    Injuries in cervical spine X-ray images are often missed by emergency physicians. Many of these missing injuries cause further complications....
    S. M. Masudur Rahman Al Arif, Michael Gundry, ... Greg Slabaugh in Computational Methods and Clinical Applications for Spine Imaging
    Conference paper 2016
  4. Perceiving Motion Patterns

    Humans are visual explorers. Human vision is a highly dynamic process. Consider our instinctive reaction to every sudden change. Each change may be...
    Yang Cai in Instinctive Computing
    Chapter 2016
  5. A computer vision-based perception system for visually impaired

    In this paper, we introduce a novel computer vision-based perception system, dedicated to the autonomous navigation of visually impaired people. A...

    Ruxandra Tapu, Bogdan Mocanu, Titus Zaharia in Multimedia Tools and Applications
    Article 21 May 2016
  6. Introduction

    The development of microcontrollers, communication technology, microelectromechanical systems (MEMS), and nanotechnology allowed for research and...
    Rastko R. Selmic, Vir V. Phoha, Abdul Serwadda in Wireless Sensor Networks
    Chapter 2016
  7. Interactive Banknotes Recognition for the Visual Impaired With Wearable Assistive Devices

    In this paper, we develop a new system, named WVIAS (Wearable Vision Impaired Assistive System), using camera-based computer vision technology to...
    Dian Huang, Hong Cheng, Lu Yang in Pattern Recognition
    Conference paper 2016
  8. KopperCoin – A Distributed File Storage with Financial Incentives

    One of the current problems of peer-to-peer-based file storage systems like Freenet is missing participation, especially of storage providers. Users...
    Henning Kopp, Christoph Bösch, Frank Kargl in Information Security Practice and Experience
    Conference paper 2016
  9. Towards Practical Attribute-Based Signatures

    An attribute-based signature (ABS) is a special digital signature created using a dynamic set of issued attributes. For instance, a doctor can sign a...
    Brinda Hampiholi, Gergely Alpár, ... Bart Jacobs in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2015
  10. Team Homer@UniKoblenz — Approaches and Contributions to the RoboCup@Home Competition

    In this paper we present the approaches and contributions of team homer@UniKoblenz that were developed for and applied during the RoboCup@Home...
    Viktor Seib, Stephan Manthe, ... Dietrich Paulus in RoboCup 2015: Robot World Cup XIX
    Conference paper 2015
  11. Introduction

    The evolution of computing devices followed different paths.Despite the famous misquotation attributed to Thomas J. Watson Sr., then-president of...
    Chapter 2016
  12. UT Austin Villa: RoboCup 2015 3D Simulation League Competition and Technical Challenges Champions

    The UT Austin Villa team, from the University of Texas at Austin, won the 2015 RoboCup 3D Simulation League, winning all 19 games that the team...
    Patrick MacAlpine, Josiah Hanna, ... Peter Stone in RoboCup 2015: Robot World Cup XIX
    Conference paper 2015
  13. Hierarchical Ring Signatures Revisited – Unconditionally and Perfectly Anonymous Schnorr Version

    We propose a ring signature scheme that creates short signatures for large rings. The scheme allows signers to reuse previously created signatures to...
    Łukasz Krzywiecki, Małgorzata Sulkowska, Filip Zagórski in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2015
  14. Health Data Sharing with Misbehavior Detection

    Despite the traditional health monitoring, MHNs can offer a wide range of social network and information sharing applications. In these social...
    Kuan Zhang, Xuemin (Sherman) Shen in Security and Privacy for Mobile Healthcare Networks
    Chapter 2015
  15. On Fun

    What is immersion?
    Richard A. Bartle in MMOs from the Inside Out
    Chapter 2016
  16. A review on automatic detection and recognition of traffic sign

    Evidently, Intelligent Transport System (ITS) has progressed tremendously all its way. The core of ITS are detection and recognition of traffic sign,...

    Anjan Gudigar, Shreesha Chokkadi, Raghavendra U in Multimedia Tools and Applications
    Article 01 October 2014
  17. Approaches for the combined use of risk analysis and testing: a systematic literature review

    Risk analysis and testing are conducted for different purposes. Risk analysis and testing nevertheless involve processes that may be combined to the...

    Gencer Erdogan, Yan Li, ... Ketil Stølen in International Journal on Software Tools for Technology Transfer
    Article 03 August 2014
  18. Positioning to Win: A Dynamic Role Assignment and Formation Positioning System

    This paper presents a dynamic role assignment and formation positioning system used by the 2011 RoboCup 3D simulation league champion UT Austin...
    Patrick MacAlpine, Francisco Barrera, Peter Stone in RoboCup 2012: Robot Soccer World Cup XVI
    Conference paper 2013
  19. Traffic Density Estimation Protocol Using Vehicular Networks

    Traffic density estimates on maps not only assist drivers to decide routes that are time and fuel economical due to less congestions and but also...
    Adnan Noor Mian, Ishrat Fatima, Roberto Beraldi in Mobile and Ubiquitous Systems: Computing, Networking, and Services
    Conference paper 2013
  20. Detection of Node Clone and Sybil Attack Based on CI Approach

    A Wireless Sensor Networks (WSNs) is an interconnected system of a large set of physically small, low cost, low power sensors that provide ubiquitous...
    Chapter 2013
Did you find what you were looking for? Share feedback.