Sciweavers

5564 search results - page 1082 / 1113
» Performance Modeling of HPC Applications
Sort
View
IWNAS
2008
IEEE
14 years 3 months ago
POND: The Power of Zone Overlapping in DHT Networks
— Distributed Hash Table (DHT) based algorithms have been proposed to solve the routing issues in large-scale Peer-to-Peer (P2P) applications. DHT systems create an elegant Peer-...
Zhiyong Xu, Jizhong Han, Laxmi N. Bhuyan
ANSS
2007
IEEE
14 years 3 months ago
Vehicular Mobility Simulation for VANETs
During the last few years, continuous progresses in wireless communications have opened new research fields in computer networking, aimed at extending data networks connectivity ...
Marco Fiore, Jérôme Härri, Fethi...
ICMCS
2007
IEEE
132views Multimedia» more  ICMCS 2007»
14 years 3 months ago
An SVM Framework for Genre-Independent Scene Change Detection
We present a novel genre-independent SVM framework for detecting scene changes in broadcast video. Our framework works on content from a diverse range of genres by allowing sets o...
Naveen Goela, Kevin W. Wilson, Feng Niu, Ajay Diva...
ICRA
2007
IEEE
189views Robotics» more  ICRA 2007»
14 years 3 months ago
Stereo-based Markerless Human Motion Capture for Humanoid Robot Systems
Abstract— In this paper, we present an image-based markerless human motion capture system, intended for humanoid robot systems. The restrictions set by this ambitious goal are nu...
Pedram Azad, Ales Ude, Tamim Asfour, Rüdiger ...
IPPS
2007
IEEE
14 years 3 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
« Prev « First page 1082 / 1113 Last » Next »