Sciweavers

20197 search results - page 3829 / 4040
» Comparing Computational Power
Sort
View
MOBIDE
2010
ACM
13 years 11 months ago
Using data mining to handle missing data in multi-hop sensor network applications
A sensor's data loss or corruption, aka sensor data missing, is a common phenomenon in modern wireless sensor networks. It is more severe for multi-hop sensor network (MSN) a...
Le Gruenwald, Hanqing Yang, Md. Shiblee Sadik, Rah...
CCS
2010
ACM
13 years 11 months ago
Attacks and design of image recognition CAPTCHAs
We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper. We first review and examine all IRCs schemes known to us and evaluate each scheme against th...
Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Li...
SIGCOMM
2010
ACM
13 years 11 months ago
Rethinking iBGP routing
The Internet is organized as a collection of administrative domains, known as Autonomous Systems (ASes). These ASes interact through the Border Gateway Protocol (BGP) that allows ...
Iuniana M. Oprescu, Mickael Meulle, Steve Uhlig, C...
ICDCS
2010
IEEE
13 years 11 months ago
Resource Allocation in Distributed Mixed-Criticality Cyber-Physical Systems
—Large-scale distributed cyber-physical systems will have many sensors/actuators (each with local micro-controllers), and a distributed communication/computing backbone with mult...
Karthik Lakshmanan, Dionisio de Niz, Ragunathan Ra...
ICMCS
2010
IEEE
194views Multimedia» more  ICMCS 2010»
13 years 11 months ago
Speech emotion estimation in 3D space
Speech processing is an important aspect of affective computing. Most research in this direction has focused on classifying emotions into a small number of categories. However, nu...
Dongrui Wu, Thomas D. Parsons, Emily Mower, Shrika...
« Prev « First page 3829 / 4040 Last » Next »