Sciweavers

773 search results - page 136 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
ECCV
2004
Springer
14 years 11 months ago
Stereo Using Monocular Cues within the Tensor Voting Framework
We address the fundamental problem of matching in two static images. The remaining challenges are related to occlusion and lack of texture. Our approach addresses these difficultie...
Philippos Mordohai, Gérard G. Medioni
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
14 years 11 months ago
What's Different: Distributed, Continuous Monitoring of Duplicate-Resilient Aggregates on Data Streams
Emerging applications in sensor systems and network-wide IP traffic analysis present many technical challenges. They need distributed monitoring and continuous tracking of events....
Graham Cormode, S. Muthukrishnan, Wei Zhuang
DAC
2006
ACM
14 years 10 months ago
Statistical timing based on incomplete probabilistic descriptions of parameter uncertainty
Existing approaches to timing analysis under uncertainty are based on restrictive assumptions. Statistical STA techniques assume that the full probabilistic distribution of parame...
Wei-Shen Wang, Vladik Kreinovich, Michael Orshansk...
MOBIHOC
2009
ACM
14 years 10 months ago
Aging rules: what does the past tell about the future in mobile ad-hoc networks?
The study in mobile ad-hoc networks (MANET) is facing challenges brought by recent discovery of non-exponential behavior of the inter-contact time distribution of mobile nodes. In...
Han Cai, Do Young Eun
PERCOM
2008
ACM
14 years 9 months ago
ReMo : An Energy Efficient Reprogramming Protocol for Mobile Sensor Networks
Existing code update protocols for reprogramming nodes in a sensor network are either unsuitable or inefficient when used in a mobile environment. The prohibitive factor of uncert...
Pradip De, Yonghe Liu, Sajal K. Das