Sciweavers

2997 search results - page 477 / 600
» Fuzzy robustness analysis
Sort
View
ICRA
2007
IEEE
107views Robotics» more  ICRA 2007»
14 years 3 months ago
Real-time keypoints matching: application to visual servoing
Abstract— Many computer vision problems such as recognition, image retrieval, and tracking require matching two images. Currently, ones try to find as reliable as possible match...
Thi-Thanh-Hai Tran, Éric Marchand
IPPS
2007
IEEE
14 years 3 months ago
Novel Broadcast/Multicast Protocols for Dynamic Sensor Networks
: In this paper, we have proposed a time efficient, energy saving and robust broadcast/multicast protocol for reconfigurable cluster-based sensor network. In our broadcast protocol...
Wei Chen, Islam A. K. M. Muzahidul, Mohan Malkani,...
ISBI
2007
IEEE
14 years 3 months ago
Automatic Segmentation of Nuclei in 3d Microscopy Images of C.Elegans
Automatic segmentation of nuclei in 3D microscopy images is essential for many biological studies including high throughput analysis of gene expression level, morphology, and phen...
Fuhui Long, Hanchuan Peng, Eugene W. Myers
ISVLSI
2007
IEEE
160views VLSI» more  ISVLSI 2007»
14 years 3 months ago
On the Limitations of Power Macromodeling Techniques
Although RTL power macromodeling is a mature research topic, it is not yet broadly accepted in the industrial environment. One of the main reasons impairing its widespread use as ...
Felipe Klein, Guido Araujo, Rodolfo Azevedo, Rober...
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 3 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang