Sciweavers

329 search results - page 34 / 66
» Automatic Data Locality Optimization Through Self-optimizati...
Sort
View
DEXA
2004
Springer
172views Database» more  DEXA 2004»
14 years 1 months ago
On the Automation of Similarity Information Maintenance in Flexible Query Answering Systems
This paper proposes a method for automatic maintaining the similarity information for a particular class of Flexible Query Answering Systems (FQAS). The paper describes the three m...
Balázs Csanád Csáji, Josef K&...
TWC
2010
13 years 3 months ago
Distributed Multicell-MISO Precoding Using the Layered Virtual SINR Framework
In this letter, we address the problem of distributed multi-antenna cooperative transmission in a cellular system. Most research in this area has so far assumed that base stations ...
Randa Zakhour, David Gesbert
INFOCOM
2007
IEEE
14 years 2 months ago
Cost and Collision Minimizing Forwarding Schemes for Wireless Sensor Networks
—The paper presents a novel integrated MAC/routing scheme for wireless sensor networking. Our design objective is to elect the next hop for data forwarding by minimizing the numb...
Michele Rossi, Nicola Bui, Michele Zorzi
TCSV
2008
120views more  TCSV 2008»
13 years 8 months ago
A Parallel Hardware Architecture for Scale and Rotation Invariant Feature Detection
Abstract--This paper proposes a parallel hardware architecture for image feature detection based on the SIFT (Scale Invariant Feature Transform) algorithm and applied to the SLAM (...
Vanderlei Bonato, Eduardo Marques, George A. Const...
COMPSAC
2009
IEEE
14 years 13 days ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...