Sciweavers

3911 search results - page 646 / 783
» Real-Time Object Detection for
Sort
View
JCM
2006
179views more  JCM 2006»
13 years 9 months ago
Collaborative Allocation of Orthogonal Frequency Division Multiplex Sub-Carriers using the Swarm Intelligence
Abstract-- Future generations of wireless systems require opportunistic spectrum access techniques to effectively detect and access temporarily unused spectrum bands. Cognitive rad...
J. C. Dunat, David Grandblaise, Christian Bonnet
JODL
2006
87views more  JODL 2006»
13 years 9 months ago
Location-based services in ubiquitous computing environments
This paper presents a framework for providing dynamically deployable services in ubiquitous computing settings. The goal of the framework is to provide people, places, and objects ...
Ichiro Satoh
SIGKDD
2008
113views more  SIGKDD 2008»
13 years 8 months ago
On exploiting the power of time in data mining
We introduce the new paradigm of Change Mining as data mining over a volatile, evolving world with the objective of understanding change. While there is much work on incremental m...
Mirko Böttcher, Frank Höppner, Myra Spil...
IJNSEC
2007
171views more  IJNSEC 2007»
13 years 8 months ago
Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor net...
Afrand Agah, Sajal K. Das
IJVR
2007
72views more  IJVR 2007»
13 years 8 months ago
MACBETH: Management of Avatar Conflict by Employment of a Technique Hybrid
—When a virtual environment system prevents a user’s avatar hand from penetrating virtual objects, the seen and felt positions of the hand separate. We propose a new method for...
Eric Burns, Sharif Razzaque, Mary C. Whitton, Fred...