Sciweavers

53 search results - page 6 / 11
» Extending XQuery with Window Functions
Sort
View
ECCV
2010
Springer
12 years 1 months ago
Voting by Grouping Dependent Parts
Hough voting methods efficiently handle the high complexity of multiscale, category-level object detection in cluttered scenes. The primary weakness of this approach is however t...
Pradeep Yarlagadda, Antonio Monroy and Bjorn Ommer
OZCHI
2005
ACM
14 years 29 days ago
Dawn explorer: a framework for multimodal accessibility to computer systems
Technology is advancing at a rapid pace, automating many everyday chores in the process, changing the way we perform work and providing various forms of entertainment. Makers of t...
Frank Loewenich, Frédéric Maire
CANS
2009
Springer
164views Cryptology» more  CANS 2009»
14 years 2 months ago
Extensions of the Cube Attack Based on Low Degree Annihilators
At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an ini...
Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei We...
ICC
2007
IEEE
145views Communications» more  ICC 2007»
14 years 1 months ago
Analytical Model of TCP with Enhanced Recovery Mechanism for Wireless Environments
— In this paper, we extend the analytical model for the TCP steady state throughput as a function of the network utilization factor, round trip time and packet drop rate for unli...
A. Jayananthan, Harsha Sirisena, Vijay Garg
MWCN
2004
Springer
14 years 22 days ago
Short-Term Fairness of 802.11 Networks with Several Hosts
Previously, we have analyzed the short-term fairness of the 802.11 DCF (Distributed Coordination Function) access method in the case of a network with two hosts. In this paper we e...
Gilles Berger-Sabbatel, Andrzej Duda, Martin Heuss...