Sciweavers

294 search results - page 31 / 59
» Integrating Peer-to-Peer Networking and Computing in the Age...
Sort
View
NDSS
2002
IEEE
14 years 1 months ago
Detecting Steganographic Content on the Internet
Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their a...
Niels Provos, Peter Honeyman
FPL
2006
Springer
158views Hardware» more  FPL 2006»
14 years 20 days ago
Placing Functionality in Fault-Tolerant Hardware/Software Reconfigurable Networks
A novel framework shows the potential of FPGA-based systems for increasing fault-tolerance and flexibility by placing functionality onto free hardware (HW) or software (SW) resour...
Thilo Streichert
ICMLA
2007
13 years 10 months ago
Uncertainty optimization for robust dynamic optical flow estimation
We develop an optical flow estimation framework that focuses on motion estimation over time formulated in a Dynamic Bayesian Network. It realizes a spatiotemporal integration of ...
Volker Willert, Marc Toussaint, Julian Eggert, Edg...
TCS
2008
13 years 9 months ago
Modeling spiking neural networks
A notation for the functional specification of a wide range of neural networks consisting of temporal or non-temporal neurons, is proposed. The notation is primarily a mathematica...
Ioannis D. Zaharakis, Achilles D. Kameas
WIMOB
2008
IEEE
14 years 3 months ago
PGMS: Pseudo-optimal Greedy Media Streaming Algorithm for Heterogeneous Wireless Networks
The integration of different wireless access technologies combined with the huge characteristic diversity of supported services in next-generation systems creates a real heterogen...
Ahmed H. Zahran, Cormac J. Sreenan