Sciweavers

7623 search results - page 1385 / 1525
» Algorithmic Features of Eclat
Sort
View
IJDSN
2006
136views more  IJDSN 2006»
13 years 9 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
IVC
2008
135views more  IVC 2008»
13 years 9 months ago
Multi-modal tracking of people using laser scanners and video camera
Inspite extensive research on visual tracking of multiple people in computer vision area, the robustness and usability of visual trackers are still discouraging. Recently, a few l...
Jinshi Cui, Hongbin Zha, Huijing Zhao, Ryosuke Shi...
IJRR
2006
183views more  IJRR 2006»
13 years 9 months ago
Bayesian Occupancy Filtering for Multitarget Tracking: An Automotive Application
Reliable and efficient perception and reasoning in dynamic and densely cluttered environments are still major challenges for driver assistance systems. Most of today's system...
Christophe Coué, Cédric Pradalier, C...
CORR
2007
Springer
138views Education» more  CORR 2007»
13 years 9 months ago
Algebraic Distributed Space-Time Codes with Low ML Decoding Complexity
— ”Extended Clifford algebras” are introduced as a means to obtain low ML decoding complexity space-time block codes. Using left regular matrix representations of two speci...
G. Susinder Rajan, B. Sundar Rajan
JASIS
2006
84views more  JASIS 2006»
13 years 9 months ago
A "stereo" document representation for textual information retrieval
Encouraged by a significant improvement over LSI (latent semantic indexing) approach in textual information retrieval of the DLSI (differential latent semantic indexing) approach ...
Liang Chen, Jia Zeng, Naoyuki Tokuda
« Prev « First page 1385 / 1525 Last » Next »