Sciweavers

927 search results - page 152 / 186
» Detection of Simple Plagiarism in Computer Science Papers
Sort
View
ACSC
2004
IEEE
15 years 8 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
ENC
2004
IEEE
15 years 8 months ago
Feature Selection for Visual Gesture Recognition Using Hidden Markov Models
Hidden Markov models have become the preferred technique for visual recognition of human gestures. However, the recognition rate depends on the set of visual features used, and al...
José Antonio Montero, Luis Enrique Sucar
SPRINGSIM
2007
15 years 5 months ago
An architecture for wireless simulation in NS-2 applied to impulse-radio ultra-wide band networks
We present an architecture for implementing a wireless physical layer in a packet-based network simulator. We integrate this architecture in the popular ns-2 network simulator and...
Ruben Merz, Jean-Yves Le Boudec, Jörg Widmer
CAD
2005
Springer
15 years 4 months ago
Frontal geometry from sketches of engineering objects: is line labelling necessary?
A tool which can quickly interpret line drawings (with hidden lines removed) of engineering objects as boundary representation CAD models would be of significant benefit in the pr...
P. A. C. Varley, Ralph R. Martin, Hiromasa Suzuki
CBSE
2011
Springer
14 years 4 months ago
Rectifying orphan components using group-failover in distributed real-time and embedded systems
Orphan requests are a significant problem for multi-tier distributed systems since they adversely impact system correctness by violating the exactly-once semantics of application...
Sumant Tambe, Aniruddha S. Gokhale