Sciweavers

1272 search results - page 176 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
CN
2007
141views more  CN 2007»
15 years 4 months ago
Designing an overload control strategy for secure e-commerce applications
Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this pape...
Jordi Guitart, David Carrera, Vicenç Beltra...
JUCS
2008
166views more  JUCS 2008»
15 years 4 months ago
Exploring Lua for Concurrent Programming
The popularization of multi-core processors and of technologies such as hyper-threading demonstrates a fundamental change in the way processors have been evolving and also increase...
Alexandre Skyrme, Noemi de La Rocque Rodriguez, Ro...
PUC
2010
114views more  PUC 2010»
15 years 2 months ago
Mobile phone-based pervasive fall detection
Falls are a major health risk that diminishes the quality of life among the elderly people. The importance of fall detection increases as the elderly population surges, especially ...
Jiangpeng Dai, Xiaole Bai, Zhimin Yang, Zhaohui Sh...
ICPR
2010
IEEE
15 years 2 months ago
Scene Classification Using Spatial Pyramid of Latent Topics
We propose a scene classification method, which combines two popular methods in the literature: Spatial Pyramid Matching (SPM) and probabilistic Latent Semantic Analysis (pLSA) mod...
Emrah Ergul, Nafiz Arica
ICC
2007
IEEE
140views Communications» more  ICC 2007»
15 years 10 months ago
Empirical Discussion on Directional MAC Protocols for Ad hoc Networks using Practice Smart Antennas
Recent studies on directional Media Access Control (MAC) protocols using smart antennas for wireless ad hoc networks have shown that directional MAC protocols outperform traditiona...
Masahiro Watanabe, Hikaru Mitsuhashi, Masaki Banda...