Sciweavers

4340 search results - page 682 / 868
» Designing for change
Sort
View
CIVR
2008
Springer
138views Image Analysis» more  CIVR 2008»
15 years 6 months ago
Visual islands: intuitive browsing of visual search results
The amount of available digital multimedia has seen exponential growth in recent years. While advances have been made in the indexing and searching of images and videos, less focu...
Eric Zavesky, Shih-Fu Chang, Cheng-Chih Yang
COMSWARE
2008
IEEE
15 years 6 months ago
Density-first Ad-hoc routing protocol for MANET
In recent years, Mobile Ad-hoc Networks (MANETs) have received tremendous attention because of their self-configuration and self-maintenance capabilities. With open network archite...
Jiong Wang, Sirisha Medidi
EUC
2008
Springer
15 years 6 months ago
Adaptive Buffer Management for Efficient Code Dissemination in Multi-Application Wireless Sensor Networks
Future wireless sensor networks (WSNs) are projected to run multiple applications in the same network infrastructure. While such multi-application WSNs (MA-WSNs) are economically ...
Weijia Li, Yu Du, Youtao Zhang, Bruce Childers, Pi...
ATMOS
2007
124views Optimization» more  ATMOS 2007»
15 years 6 months ago
A Simulation/Optimization Framework for Locomotive Planning
Abstract. In this paper, we give an overview of the Locomotive Simulater/Optimizer (LSO) decision support system developed by us for railroads. This software is designed to imitate...
Artyom G. Nahapetyan, Ravindra K. Ahuja, F. Zeynep...
INFOSCALE
2007
ACM
15 years 6 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü