Sciweavers

432 search results - page 48 / 87
» Performance Characterization of Landmark Operators
Sort
View
CVPR
2007
IEEE
16 years 4 months ago
Efficient Indexing For Articulation Invariant Shape Matching And Retrieval
Most shape matching methods are either fast but too simplistic to give the desired performance or promising as far as performance is concerned but computationally demanding. In th...
Soma Biswas, Gaurav Aggarwal, Rama Chellappa
DSN
2008
IEEE
15 years 9 months ago
Toward an understanding of the processing delay of peer-to-peer relay nodes
Abstract—Peer-to-peer relaying is commonly used in realtime applications to cope with NAT and firewall restrictions and provide better quality network paths. As relaying is not ...
Kuan-Ta Chen, Jing-Kai Lou
ICC
2007
IEEE
15 years 6 months ago
Interference Handling in UWB Versus 802.11n Networks
Abstract-- UWB and 802.11n have both been touted as technologies for next generation wireless networks. UWB exploiting a large bandwidth, and 802.11n utilizing MIMO, demonstrate hi...
Arjunan Rajeswaran, Gyouhwan Kim, Rohit Negi, Sai ...
138
Voted
TCOM
2010
168views more  TCOM 2010»
14 years 9 months ago
A unified analysis of routing protocols in MANETs
This paper presents a mathematical framework for the evaluation of the performance of proactive and reactive routing protocols in mobile ad hoc networks (MANETs). This unified fram...
Hui Xu, Xianren Wu, Hamid R. Sadjadpour, J. J. Gar...
SOSP
2007
ACM
15 years 11 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...