Sciweavers

1144 search results - page 149 / 229
» Feasibility Studies
Sort
View
ICPP
2008
IEEE
14 years 3 months ago
Bounded LSH for Similarity Search in Peer-to-Peer File Systems
Similarity search has been widely studied in peer-to-peer environments. In this paper, we propose the Bounded Locality Sensitive Hashing (Bounded LSH) method for similarity search...
Yu Hua, Bin Xiao, Dan Feng, Bo Yu
IEEEIAS
2008
IEEE
14 years 3 months ago
Geolocation-Based Trust for Vanet's Privacy
: Research in Vehicular Ad Hoc NETworks (VANETs) has evolved considerably over the last years. Security and privacy in VANETs have recently appealed special interest in the researc...
Jetzabel Serna, Jesus Luna, Manel Medina
IROS
2008
IEEE
108views Robotics» more  IROS 2008»
14 years 3 months ago
Synchronous imitation control for biped robot based on wearable human motion analysis system
— To achieve accurate and efficient interaction with humans, robot training is indispensable to make robot cooperate with different host. We are focusing on development of a huma...
Tao Liu, H. Utsunomiya, Yoshio Inoue, Kyoko Shibat...
WCNC
2008
IEEE
14 years 3 months ago
On Collision-Tolerant Transmission with Directional Antennas
—The application of directional antennas in wireless networks brings numerous benefits, such as increased spatial reuse and mitigated interferences. Most MAC protocols with dire...
Hongning Dai, Kam-Wing Ng, Min-You Wu
HICSS
2007
IEEE
119views Biometrics» more  HICSS 2007»
14 years 3 months ago
Collection of U.S. Extremist Online Forums: A Web Mining Approach
Extremists’ exploitation of computer-mediated communications such as online forums has recently gained much attention from academia and the government. However, due to the cover...
Yilu Zhou, Jialun Qin, Guanpi Lai, Hsinchun Chen