Sciweavers

644 search results - page 108 / 129
» A Proposal for the Implementation of a Parallel Watershed Al...
Sort
View
IPPS
2010
IEEE
13 years 6 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...
FCCM
2005
IEEE
132views VLSI» more  FCCM 2005»
14 years 2 months ago
Hardware Factorization Based on Elliptic Curve Method
The security of the most popular asymmetric cryptographic scheme RSA depends on the hardness of factoring large numbers. The best known method for factorization large integers is ...
Martin Simka, Jan Pelzl, Thorsten Kleinjung, Jens ...
AINA
2009
IEEE
14 years 3 months ago
Distributed Search for Balanced Energy Consumption Spanning Trees in Wireless Sensor Networks
— Sensor networks are commonly used for security and surveillance applications. As sensor nodes have limited battery paower, computing, and storage resources, the energy efficie...
Andrei Gagarin, Sajid Hussain, Laurence Tianruo Ya...
CCGRID
2009
IEEE
14 years 3 months ago
Multicast Trees for Collaborative Applications
—Current implementations of real-time collaborative applications rely on a dedicated infrastructure to carry out all synchronizing and communication functions, and require all en...
Krzysztof Rzadca, Jackson Tan Teck Yong, Anwitaman...
IROS
2007
IEEE
147views Robotics» more  IROS 2007»
14 years 2 months ago
Uncalibrated video compass for mobile robots from paracatadioptric line images
— Due to their panoramic field of view, catadioptric cameras are becoming ubiquitous in many robotics and computer vision applications. Catadioptric cameras with a unique viewpo...
Gian Luca Mariottini, Domenico Prattichizzo