Sciweavers

7112 search results - page 1249 / 1423
» Power in normative systems
Sort
View
MAGS
2006
79views more  MAGS 2006»
13 years 9 months ago
Utilizing node's selfishness for providing complete anonymity in peer-to-peer based grids
In this paper, a novel protocol for providing both client and server anonymity in peer-to-peer (P2P) based grids is presented. The protocol assumes individual nodes or users to be...
Rohit Gupta, Souvik Ray, Arun K. Somani, Zhao Zhan...
MR
2006
114views Robotics» more  MR 2006»
13 years 9 months ago
CCGA packages for space applications
Commercial-off-the-shelf (COTS) area array packaging technologies in high reliability versions are now being considered for applications, including use in a number of NASA electro...
Reza Ghaffarian
IAJIT
2007
150views more  IAJIT 2007»
13 years 9 months ago
Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc
: Mobile ad-hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the abi...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...
PAMI
2006
185views more  PAMI 2006»
13 years 9 months ago
Generic Object Recognition with Boosting
This paper explores the power and the limitations of weakly supervised categorization. We present a complete framework that starts with the extraction of various local regions of e...
Andreas Opelt, Axel Pinz, Michael Fussenegger, Pet...
PRL
2006
95views more  PRL 2006»
13 years 9 months ago
Evolving visual sonar: Depth from monocular images
To recover depth from images, the human visual system uses many monocular depth cues, which vision research has only begun to explore. Because a given image can have many possible...
Martin C. Martin
« Prev « First page 1249 / 1423 Last » Next »