Sciweavers

8655 search results - page 1692 / 1731
» Challenges for Trusted Computing
Sort
View
CCR
2008
76views more  CCR 2008»
13 years 9 months ago
WebClass: adding rigor to manual labeling of traffic anomalies
Despite the flurry of anomaly-detection papers in recent years, effective ways to validate and compare proposed solutions have remained elusive. We argue that evaluating anomaly d...
Haakon Ringberg, Augustin Soule, Jennifer Rexford
CGF
2008
121views more  CGF 2008»
13 years 9 months ago
Tensor Clustering for Rendering Many-Light Animations
Rendering animations of scenes with deformable objects, camera motion, and complex illumination, including indirect lighting and arbitrary shading, is a long-standing challenge. P...
Milos Hasan, Edgar Velázquez-Armendá...
CGF
2008
131views more  CGF 2008»
13 years 9 months ago
Peek-in-the-Pic: Flying Through Architectural Scenes From a Single Image
Many casually taken "tourist" photographs comprise of architectural objects like houses, buildings, etc. Reconstructing such 3D scenes captured in a single photograph is...
Amit Shesh, Baoquan Chen
CN
2008
176views more  CN 2008»
13 years 9 months ago
ARQ-based cross-layer optimization for wireless multicarrier transmission on cognitive radio networks
The primary feature of cognitive radios for wireless communication systems is the capability to optimize the relevant communication parameters given a dynamic wireless channel env...
Alexandre de Baynast, Petri Mähönen, Mar...
CN
2008
127views more  CN 2008»
13 years 9 months ago
Decentralized detection of global threshold crossings using aggregation trees
The timely detection that a monitored variable has crossed a given threshold is a fundamental requirement for many network management applications. A challenge is the detection of ...
Fetahi Wuhib, Mads Dam, Rolf Stadler
« Prev « First page 1692 / 1731 Last » Next »