Sciweavers

1227 search results - page 205 / 246
» Efficient Video-Stream Filtering
Sort
View
151
Voted
PETRA
2010
ACM
15 years 6 months ago
Context-aware optimized information dissemination in large scale vehicular networks
Context-aware inter-vehicular communication is considered to be vital for inducing intelligence through the use of embedded computing devices inside vehicles. Vehicles in a scalab...
Yves Vanrompay, Ansar-Ul-Haque Yasar, Davy Preuven...
104
Voted
WCNC
2010
IEEE
15 years 6 months ago
Sampling Jitter Cancellation in Direct-Sampling Radio
—This paper addresses the sampling jitter estimation and cancellation task in direct RF sub-sampling type radios. The proposed jitter estimation method is based on carefully inje...
Ville Syrjala, Mikko Valkama
114
Voted
ACSAC
2004
IEEE
15 years 6 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
124
Voted
CPAIOR
2004
Springer
15 years 6 months ago
A Global Constraint for Graph Isomorphism Problems
The graph isomorphism problem consists in deciding if two given graphs have an identical structure. This problem can be modeled as a constraint satisfaction problem in a very strai...
Sébastien Sorlin, Christine Solnon
112
Voted
CSB
2004
IEEE
142views Bioinformatics» more  CSB 2004»
15 years 6 months ago
FastR: Fast Database Search Tool for Non-Coding RNA
The discovery of novel non-coding RNAs has been among the most exciting recent developments in Biology. Yet, many more remain undiscovered. It has been hypothesized that there is ...
Vineet Bafna, Shaojie Zhang