Sciweavers

1805 search results - page 274 / 361
» Computationally Efficient Face Detection
Sort
View
IPPS
2007
IEEE
15 years 10 months ago
Popularity Adaptive Search in Hybrid P2P Systems
In a hybrid peer-to-peer (P2P) system, flooding and DHT are both employed for content locating. The decision to use flooding or DHT largely depends on the population of desired da...
Xiaoqiu Shi, Jinsong Han, Yunhao Liu, Lionel M. Ni
ICCSA
2007
Springer
15 years 10 months ago
Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods
In our recent study, we have presented an approach for tracing illegal users in content distribution networks using watermarking and fingerprinting techniques [1][2]. In this paper...
Hyun-Ho Kang, Brian M. Kurkoski, Kazuhiko Yamaguch...
128
Voted
SMI
1999
IEEE
116views Image Analysis» more  SMI 1999»
15 years 8 months ago
Intersecting Surfaces of Special Types
We present efficient and robust algorithms for intersecting a freeform surface with a ringed surface or a ruled surface. A ringed surface is given as a one-parameter family of cir...
Myung-Soo Kim
WCNC
2010
IEEE
15 years 7 months ago
Experiences and Lessons from Implementing a Wireless Sensor Network MAC Protocol in the Castalia Simulator
—We describe our experience from the implementation of the T-MAC protocol for wireless sensor networks in the open-source Castalia simulator. Notwithstanding the popularity of th...
Yuri Tselishchev, Athanassios Boulis, Lavy Libman
CCGRID
2004
IEEE
15 years 7 months ago
A reputation-based trust management system for P2P networks
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper, we propose a reputation-based trust management sy...
Ali Aydin Selçuk, Ersin Uzun, Mark Resat Pa...