Sciweavers

349 search results - page 53 / 70
» Symmetrically exploiting XML
Sort
View
ICIP
2008
IEEE
14 years 4 months ago
Automatic lattice detection in near-regular histology array images
Near-regular texture (NRT), denoting deviations from otherwise symmetric wallpaper patterns, is commonly observable in the real world. Existing lattice detection algorithms captur...
Brian A. Canada, Georgia K. Thomas, Keith C. Cheng...
ICC
2007
IEEE
145views Communications» more  ICC 2007»
14 years 4 months ago
Adaptive Radial Basis Function Detector for Beamforming
— We consider nonlinear detection in rank-deficient multiple-antenna assisted beamforming systems. By exploiting the inherent symmetry of the underlying optimal Bayesian detecti...
Sheng Chen, Khaled Labib, Rong Kang, Lajos Hanzo
COREGRID
2007
Springer
14 years 4 months ago
Atomic Commitment in Transactional DHTs
We investigate the problem of atomic commit in transactional database systems built on top of Distributed Hash Tables. Therefore we present a framework for DHTs to provide strong d...
Monika Moser, Seif Haridi
GECCO
2007
Springer
289views Optimization» more  GECCO 2007»
14 years 4 months ago
A discrete particle swarm optimization algorithm for the generalized traveling salesman problem
Dividing the set of nodes into clusters in the well-known traveling salesman problem results in the generalized traveling salesman problem which seeking a tour with minimum cost p...
Mehmet Fatih Tasgetiren, Ponnuthurai N. Suganthan,...
ADHOCNOW
2005
Springer
14 years 3 months ago
Enhancing the Security of On-demand Routing in Ad Hoc Networks
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity...
Zhenjiang Li, J. J. Garcia-Luna-Aceves