Sciweavers

1228 search results - page 88 / 246
» Manipulation of Pose Distributions
Sort
View
INFOCOM
2006
IEEE
15 years 10 months ago
Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis
— As the commercial success of the IEEE 802.11 protocol has made wireless infrastructure widely deployed, user organizations are increasingly concerned about the new vulnerabilit...
Yanxia Rong, Sang Kyu Lee, Hyeong-Ah Choi
IJCV
2006
266views more  IJCV 2006»
15 years 4 months ago
Kernel Density Estimation and Intrinsic Alignment for Shape Priors in Level Set Segmentation
In this paper, we make two contributions to the field of level set based image segmentation. Firstly, we propose shape dissimilarity measures on the space of level set functions wh...
Daniel Cremers, Stanley Osher, Stefano Soatto
SIGCOMM
2005
ACM
15 years 10 months ago
OpenDHT: a public DHT service and its uses
Large-scale distributed systems are hard to deploy, and distributed hash tables (DHTs) are no exception. To lower the barriers facing DHT-based applications, we have created a pub...
Sean C. Rhea, Brighten Godfrey, Brad Karp, John Ku...
DEXA
2007
Springer
144views Database» more  DEXA 2007»
15 years 10 months ago
Cooperative Data Management for XML Data
Emerging non-standard applications like the production of high-quality spatial sound pose new challenges to data management. Beside the need for a flexible transactional managemen...
Katja Hose, Kai-Uwe Sattler
EEE
2005
IEEE
15 years 10 months ago
Flexible Application Rights Management in a Pervasive Environment
The development and wider use of wireless networks and mobile devices has led to novel pervasive computing environments which pose new problems for software rights management and ...
Ivana Dusparic, Dominik Dahlem, Jim Dowling