Sciweavers

2874 search results - page 533 / 575
» Intrusion Detection: Systems and Models
Sort
View
ICPP
2008
IEEE
14 years 4 months ago
Scalable Techniques for Transparent Privatization in Software Transactional Memory
—We address the recently recognized privatization problem in software transactional memory (STM) runtimes, and introduce the notion of partially visible reads (PVRs) to heuristic...
Virendra J. Marathe, Michael F. Spear, Michael L. ...
ICC
2007
IEEE
149views Communications» more  ICC 2007»
14 years 4 months ago
Reliability-based Partial Parallel Interference Cancellation and Iterative Decoding for DS-CDMA over Fading Channels
—Multistage Partial Parallel Interference Cancellation (PPIC) is proposed for Turbo-encoded DS-CDMA systems where the partial cancellation factors are derived based on the Loglik...
Ayman Elezabi
IROS
2007
IEEE
171views Robotics» more  IROS 2007»
14 years 4 months ago
Learning full-body motions from monocular vision: dynamic imitation in a humanoid robot
— In an effort to ease the burden of programming motor commands for humanoid robots, a computer vision technique is developed for converting a monocular video sequence of human p...
Jeffrey B. Cole, David B. Grimes, Rajesh P. N. Rao
3DPVT
2006
IEEE
186views Visualization» more  3DPVT 2006»
14 years 4 months ago
Range Image Registration Based on Circular Features
Range sensing technology allows the photo-realistic modeling of large-scale scenes, such as urban structures. A major bottleneck in the process of 3D scene acquisition is the auto...
Cecilia Chao Chen, Ioannis Stamos
AINA
2006
IEEE
14 years 4 months ago
Simulation Architecture for Data Processing Algorithms in Wireless Sensor Networks
Abstract— Wireless sensor networks, by providing an unprecedented way of interacting with the physical environment, have become a hot topic for research over the last few years. ...
Yann-Aël Le Borgne, Mehdi Moussaid, Gianluca ...