Sciweavers

514 search results - page 57 / 103
» Packet Classification Algorithms: From Theory to Practice
Sort
View
WICON
2008
13 years 10 months ago
Risk-aware beacon scheduling for tree-based ZigBee/IEEE 802.15.4 wireless networks
In a tree-based ZigBee network, ZigBee routers (ZRs) must schedule their beacon transmission times to avoid beacon collisions. The beacon schedule determines packet delivery laten...
Li-Hsing Yen, Yee Wei Law, Marimuthu Palaniswami
ICCV
2009
IEEE
13 years 6 months ago
A robust boosting tracker with minimum error bound in a co-training framework
The varying object appearance and unlabeled data from new frames are always the challenging problem in object tracking. Recently machine learning methods are widely applied to tra...
Rong Liu, Jian Cheng, Hanqing Lu
INFOCOM
2007
IEEE
14 years 3 months ago
The Impact of Stochastic Noisy Feedback on Distributed Network Utility Maximization
—The implementation of distributed network utility maximization (NUM) algorithms hinges heavily on information feedback through message passing among network elements. In practic...
Junshan Zhang, Dong Zheng, Mung Chiang
WCE
2007
13 years 10 months ago
Reconstruction of 3D Solid Models Using Fuzzy Logic Recognition
—This paper presents an application of fuzzy logic theory to the reconstruction of solid models from engineering drawings. In engineering drawing, two-dimensional (2D) orthograph...
Zhe Wang, Mohammed Latif
WWW
2007
ACM
14 years 9 months ago
Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography
In a social network, nodes correspond to people or other social entities, and edges correspond to social links between them. In an effort to preserve privacy, the practice of anon...
Lars Backstrom, Cynthia Dwork, Jon M. Kleinberg