Sciweavers

9726 search results - page 1827 / 1946
» An Approach to Optimize Data Processing in Business Processe...
Sort
View
JCM
2007
191views more  JCM 2007»
15 years 4 months ago
Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions
— The use of signal processing techniques to protect wireless transmissions is proposed as a way to secure wireless networks at the physical layer. This approach addresses a uniq...
Xiaohua Li, Juite Hwu, E. Paul Ratazzi
TOG
2008
241views more  TOG 2008»
15 years 4 months ago
Single image dehazing
In this paper we present a new method for estimating the optical transmission in hazy scenes given a single input image. Based on this estimation, the scattered light is eliminate...
Raanan Fattal
161
Voted
TON
2008
125views more  TON 2008»
15 years 4 months ago
Two techniques for fast computation of constrained shortest paths
Abstract-- Computing constrained shortest paths is fundamental to some important network functions such as QoS routing, which is to find the cheapest path that satisfies certain co...
Shigang Chen, Meongchul Song, Sartaj Sahni
AIEDU
2004
105views more  AIEDU 2004»
15 years 4 months ago
Evaluating the REDEEM Authoring Tool: Can Teachers Create Effective Learning Environments?
The REDEEM authoring environment allows teachers to create learning environments from existing computer-based training (CBT) by imposing their pedagogical preferences about how stu...
Shaaron Ainsworth, Shirley Grimshaw
TVCG
2008
145views more  TVCG 2008»
15 years 4 months ago
Geometry-Based Edge Clustering for Graph Visualization
Graphs have been widely used to model relationships among data. For large graphs, excessive edge crossings make the display visually cluttered and thus difficult to explore. In thi...
Weiwei Cui, Hong Zhou, Huamin Qu, Pak Chung Wong, ...
« Prev « First page 1827 / 1946 Last » Next »