Sciweavers

6042 search results - page 1200 / 1209
» Repeated Observation Models
Sort
View
PIMRC
2010
IEEE
13 years 7 months ago
Multi-dimensional K-factor analysis for V2V radio channels in open sub-urban street crossings
In this paper we analyze the Ricean K-factor for vehicle-to-vehicle (V2V) communications in a typical open suburban street crossing. The channel conditions vary from non line-of si...
Laura Bernadó, Thomas Zemen, Johan Karedal,...
SENSYS
2010
ACM
13 years 7 months ago
AutoWitness: locating and tracking stolen property while tolerating GPS and radio outages
We present AutoWitness, a system to deter, detect, and track personal property theft, improve historically dismal stolen property recovery rates, and disrupt stolen property distr...
Santanu Guha, Kurt Plarre, Daniel Lissner, Somnath...
USS
2010
13 years 7 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
WISE
2010
Springer
13 years 7 months ago
Neighborhood-Restricted Mining and Weighted Application of Association Rules for Recommenders
Abstract. Association rule mining algorithms such as Apriori were originally developed to automatically detect patterns in sales transactions and were later on also successfully ap...
Fatih Gedikli, Dietmar Jannach
EGH
2009
Springer
13 years 7 months ago
Object partitioning considered harmful: space subdivision for BVHs
A major factor for the efficiency of ray tracing is the use of good acceleration structures. Recently, bounding volume hierarchies (BVHs) have become the preferred acceleration st...
Stefan Popov, Iliyan Georgiev, Rossen Dimov, Phili...
« Prev « First page 1200 / 1209 Last » Next »