Sciweavers

7066 search results - page 1372 / 1414
» Contact Relations with Applications
Sort
View
CCR
2007
119views more  CCR 2007»
13 years 7 months ago
Exploiting KAD: possible uses and misuses
Peer-to-peer systems have seen a tremendous growth in the last few years and peer-to-peer traffic makes a major fraction of the total traffic seen in the Internet. The dominating ...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...
CI
2007
99views more  CI 2007»
13 years 7 months ago
A Training Simulation System with Realistic Autonomous Ship Control
In this paper we present a computational approach to developing effective training systems for virtual simulation environments. In particular, we focus on a Naval simulation syste...
Monica N. Nicolescu, Ryan E. Leigh, Adam Olendersk...
CN
2007
146views more  CN 2007»
13 years 7 months ago
Autonomic control and personalization of a wireless access network
As ICT services are becoming more ubiquitous and mobile and access technologies grow to be more heterogeneous and complex, we are witnessing the increasing importance of two relat...
Nicola Blefari-Melazzi, Dario Di Sorte, Mauro Femm...
COMCOM
2007
78views more  COMCOM 2007»
13 years 7 months ago
On TCP performance over asymmetric satellite links with real-time constraints
Real-time transmission over asymmetric satellite IP links is challenging, since satellite systems commonly exhibit long propagation delays, while bandwidth asymmetry often enforce...
Panagiotis Papadimitriou, Vassilis Tsaoussidis
IJCV
2006
100views more  IJCV 2006»
13 years 7 months ago
A General Framework for Combining Visual Trackers - The "Black Boxes" Approach
Abstract. Over the past few years researchers have been investigating the enhancement of visual tracking performance by devising trackers that simultaneously make use of several di...
Ido Leichter, Michael Lindenbaum, Ehud Rivlin
« Prev « First page 1372 / 1414 Last » Next »