Sciweavers

4596 search results - page 865 / 920
» Mobile Business Processes
Sort
View
INFOCOM
2006
IEEE
14 years 2 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
SIPS
2006
IEEE
14 years 2 months ago
A New Early Termination Scheme of Iterative Turbo Decoding Using Decoding Threshold
Although many stopping methods of iterative decoding have been discussed in the literatures extensively, many of them only focus on the solvable decoding. In this paper, we propos...
Fan-Min Li, Cheng-Hung Lin, An-Yeu Wu
VRML
2006
ACM
14 years 2 months ago
Using expressive rendering for remote visualization of large city models
In this paper, we present a new approach for remote visualization of large 3D cities. Our approach is based on expressive rendering (also known as Non-Photorealistic Rendering), a...
Jean-Charles Quillet, Gwenola Thomas, Xavier Grani...
ICRA
2005
IEEE
142views Robotics» more  ICRA 2005»
14 years 2 months ago
Correspondenceless Ego-Motion Estimation Using an IMU
Abstract— Mobile robots can be easily equipped with numerous sensors which can aid in the tasks of localization and ego-motion estimation. Two such examples are Inertial Measurem...
Ameesh Makadia, Kostas Daniilidis
IEEESCC
2005
IEEE
14 years 2 months ago
Context Aware Session Management for Services in Ad Hoc Networks
— The increasing ubiquity of wireless mobile devices is promoting unprecedented levels of electronic collaboration among devices interoperating to achieve a common goal. Issues r...
Radu Handorean, Rohan Sen, Gregory Hackmann, Gruia...