Sciweavers

1275 search results - page 57 / 255
» Are you having difficulty
Sort
View
GLOBECOM
2006
IEEE
14 years 1 months ago
Blocking Vulnerable Paths of Wireless Sensor Networks
— In this work, we study the topology enhancement problem of wireless sensor networks. Our research focuses on reducing the path-based vulnerability. The objective is to get as m...
Shu Zhou, Min-You Wu, Wei Shu
ICMCS
2006
IEEE
142views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Tricodes: A Barcode-Like Fiducial Design for Augmented Reality Media
Visual markers, or fiducials, have become one of the most common methods of camera pose estimation in Augmented Reality (AR) media. Many present day fiducial-based AR systems us...
Jonathan Mooser, Suya You, Ulrich Neumann
VALUETOOLS
2006
ACM
162views Hardware» more  VALUETOOLS 2006»
14 years 1 months ago
Fast solvers for queueing systems with negative customers
In this paper, we are interested in solving Markovian queueing systems having Poisson batch arrivals, exponential servers and negative customers. Preconditioned conjugate gradient...
You-Wei Wen, Wai-Ki Ching, Michael K. Ng
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Minimum Cost Wireless Broadband Overlay Network Planning
Wireless broadband networks, especially WiMAX networks, have emerged in the industry recently and many challenging research issues arise. In this paper, we proposed a heuristic cl...
Peng Lin, Hung Q. Ngo, Chunming Qiao, Xin Wang, Ti...
WINE
2005
Springer
98views Economy» more  WINE 2005»
14 years 1 months ago
A Framework on Compound Knowledge Push System Oriented to Organizational Employees
Organizational employees have different knowledge demands and the knowledge is compound. So how to push the right compound knowledge to the right organizational employees becomes i...
Zhi-Ping Fan, Yong Feng, Yong-Hong Sun, Bo Feng, T...