Sciweavers

13224 search results - page 2634 / 2645
» Self-monitoring for Computer Users
Sort
View
COMCOM
2010
129views more  COMCOM 2010»
13 years 7 months ago
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In ord...
Levente Buttyán, László D&oac...
CGF
2008
100views more  CGF 2008»
13 years 7 months ago
Density Displays for Data Stream Monitoring
In many business applications, large data workloads such as sales figures or process performance measures need to be monitored in real-time. The data analysts want to catch proble...
Ming C. Hao, Daniel A. Keim, Umeshwar Dayal, Danie...
CGF
2008
118views more  CGF 2008»
13 years 7 months ago
Exploratory Visualization of Animal Kinematics Using Instantaneous Helical Axes
We present novel visual and interactive techniques for exploratory visualization of animal kinematics using instantaneous helical axes (IHAs). The helical axis has been used in or...
Daniel F. Keefe, Trevor M. O'Brien, D. B. Baier, S...
CORR
2008
Springer
132views Education» more  CORR 2008»
13 years 7 months ago
Dynamic Rate Allocation in Fading Multiple-access Channels
We consider the problem of rate allocation in a fading Gaussian multiple-access channel (MAC) with fixed transmission powers. Our goal is to maximize a general concave utility func...
Ali ParandehGheibi, Atilla Eryilmaz, Asuman E. Ozd...
CVIU
2008
296views more  CVIU 2008»
13 years 7 months ago
Image segmentation evaluation: A survey of unsupervised methods
Image segmentation is an important processing step in many image, video and computer vision applications. Extensive research has been done in creating many different approaches an...
Hui Zhang, Jason E. Fritts, Sally A. Goldman
« Prev « First page 2634 / 2645 Last » Next »