Sciweavers

1893 search results - page 353 / 379
» Computational composites
Sort
View
NDSS
2008
IEEE
14 years 2 months ago
Halo: High-Assurance Locate for Distributed Hash Tables
We study the problem of reliably searching for resources in untrusted peer-to-peer networks, where a significant portion of the participating network nodes may act maliciously to...
Apu Kapadia, Nikos Triandopoulos
ACIVS
2008
Springer
14 years 2 months ago
Crowd Behavior Recognition for Video Surveillance
Abstract. Crowd behavior recognition is becoming an important research topic in video surveillance for public places. In this paper, we first discuss the crowd feature selection a...
Shobhit Saxena, François Brémond, Mo...
SOFSEM
2007
Springer
14 years 2 months ago
Deterministic Simulation of a NFA with k -Symbol Lookahead
We investigate deterministically simulating (i.e., solving the membership problem for) nondeterministic finite automata (NFA), relying solely on the NFA’s resources (states and ...
Bala Ravikumar, Nicolae Santean
ICDCS
2006
IEEE
14 years 2 months ago
Greedy is Good: On Service Tree Placement for In-Network Stream Processing
This paper is concerned with reducing communication costs when executing distributed user tasks in a sensor network. We take a service-oriented abstraction of sensor networks, whe...
Zoë Abrams, Jie Liu
NPAR
2006
ACM
14 years 1 months ago
Real-time pencil rendering
ROJECTPROJECT ABSTRACTABSTRACTABSTRACT After achieving real-time photorealistic rendering, the computer graphics community is beginning to turn its attention to non-photorealistic ...
Hyunjun Lee, Sungtae Kwon, Seungyong Lee