Sciweavers

858 search results - page 107 / 172
» One Is Enough!
Sort
View
TSE
2010
148views more  TSE 2010»
13 years 7 months ago
Program Behavior Discovery and Verification: A Graph Grammar Approach
—Discovering program behaviors and functionalities can ease program comprehension and verification. Existing program analysis approaches have used text mining algorithms to infer...
Chunying Zhao, Jun Kong, Kang Zhang
VTC
2010
IEEE
259views Communications» more  VTC 2010»
13 years 7 months ago
User Multiplexing in Relay Enhanced LTE-Advanced Networks
—The 3rd Generation Partnership Project has recently started the standardization process for LTE-Advanced, as a major evolution step of UTRAN LTE Release 8. One of the key enhanc...
Oumer M. Teyeb, Frank Frederiksen, Vinh Van Phan, ...
ADHOCNETS
2010
Springer
13 years 7 months ago
Event Detection in Wireless Sensor Networks - Can Fuzzy Values Be Accurate?
Event detection is a central component in numerous wireless sensor network (WSN) applications. In spite of this, the area of event description has not received enough attention. Th...
Krasimira Kapitanova, Sang Hyuk Son, Kyoung-Don Ka...
BMVC
2010
13 years 7 months ago
Robust Camera Calibration using Inaccurate Targets
Accurate intrinsic camera calibration is essential to any computer vision task that involves image based measurements. Given its crucial role with respect to precision, a large nu...
Andrea Albarelli, Emanuele Rodolà, Andrea T...
APNOMS
2009
Springer
13 years 6 months ago
Network Partitioning and Self-sizing Methods for QoS Management with Autonomic Characteristics
The inherent and increasing complexity, heterogeneity and unpredictability of computer networks make the task of managing these systems highly complex. The autonomic computing para...
Romildo Martins da Silva Bezerra, Joberto Sé...