Sciweavers

5169 search results - page 1032 / 1034
» Locality approximation using time
Sort
View
JNCA
2011
137views more  JNCA 2011»
13 years 3 months ago
Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks
Built upon a shared wireless medium, wireless mesh network is particularly vulnerable to jamming attacks. The ability to recover from attacks and maintain an acceptable level of s...
Shanshan Jiang, Yuan Xue
TMI
2011
144views more  TMI 2011»
13 years 3 months ago
Automated Mitosis Detection of Stem Cell Populations in Phase-Contrast Microscopy Images
—Due to the enormous potential and impact that stem cells may have on regenerative medicine, there has been a rapidly growing interest for tools to analyze and characterize the b...
Seungil Huh, Dai Fei E. Ker, Ryoma Bise, Mei Chen,...
WWW
2011
ACM
13 years 3 months ago
Finding the bias and prestige of nodes in networks based on trust scores
Many real-life graphs such as social networks and peer-topeer networks capture the relationships among the nodes by using trust scores to label the edges. Important usage of such ...
Abhinav Mishra, Arnab Bhattacharya
TITS
2010
189views Education» more  TITS 2010»
13 years 3 months ago
Head Pose Estimation and Augmented Reality Tracking: An Integrated System and Evaluation for Monitoring Driver Awareness
Driver distraction and inattention are prominent causes of automotive collisions. To enable driver-assistance systems to address these problems, we require new sensing approaches t...
Erik Murphy-Chutorian, Mohan M. Trivedi
TKDE
2010
218views more  TKDE 2010»
13 years 3 months ago
LIGHT: A Query-Efficient Yet Low-Maintenance Indexing Scheme over DHTs
DHT is a widely used building block for scalable P2P systems. However, as uniform hashing employed in DHTs destroys data locality, it is not a trivial task to support complex queri...
Yuzhe Tang, Shuigeng Zhou, Jianliang Xu
« Prev « First page 1032 / 1034 Last » Next »