Sciweavers

3318 search results - page 547 / 664
» The Weak Instance Model
Sort
View
IJNS
2000
130views more  IJNS 2000»
13 years 10 months ago
A Programmable VLSI Filter Architecture for Application in Real-Time Vision Processing Systems
An architecture is proposed for the realization of real-time edge-extraction filtering operation in an Address-Event-Representation (AER) vision system. Furthermore, the approach ...
Teresa Serrano-Gotarredona, Andreas G. Andreou, Be...
CORR
2010
Springer
118views Education» more  CORR 2010»
13 years 10 months ago
Large scale probabilistic available bandwidth estimation
The common utilization-based definition of available bandwidth and many of the existing tools to estimate it suffer from several important weaknesses: i) most tools report a point...
Frederic Thouin, Mark Coates, Michael G. Rabbat
NETWORK
2007
234views more  NETWORK 2007»
13 years 10 months ago
Surveillance Wireless Sensor Networks: Deployment Quality Analysis
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of depl...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
PRL
2007
287views more  PRL 2007»
13 years 10 months ago
2D and 3D face recognition: A survey
Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weakn...
Andrea F. Abate, Michele Nappi, Daniel Riccio, Gab...
INFOCOM
2010
IEEE
13 years 9 months ago
On the Fundamental Limits of Broadcasting in Wireless Mobile Networks
Abstract—In this paper, we investigate the fundamental properties of broadcasting in mobile wireless networks. In particular, we characterize broadcast capacity and latency of a ...
Giovanni Resta, Paolo Santi