Sciweavers

1015 search results - page 200 / 203
» The data locality of work stealing
Sort
View
ESAS
2004
Springer
13 years 11 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
FINTAL
2006
13 years 11 months ago
Coordination Structures in a Typed Feature Structure Grammar: Formalization and Implementation
Abstract. Every language employs its own coordination strategies, according to the type of coordinating marking, the pattern of marking, the position of the marker, and the phrase ...
Jong-Bok Kim, Jaehyung Yang
CIKM
2008
Springer
13 years 9 months ago
Non-local evidence for expert finding
The task addressed in this paper, finding experts in an enterprise setting, has gained in importance and interest over the past few years. Commonly, this task is approached as an ...
Krisztian Balog, Maarten de Rijke
CRV
2006
IEEE
176views Robotics» more  CRV 2006»
13 years 9 months ago
Stereo Retinex
The retinex algorithm for lightness and color constancy is extended to include 3-dimensional spatial information reconstructed from a stereo image. A key aspect of traditional ret...
Weihua Xiong, Brian V. Funt
NIPS
2007
13 years 9 months ago
People Tracking with the Laplacian Eigenmaps Latent Variable Model
Reliably recovering 3D human pose from monocular video requires models that bias the estimates towards typical human poses and motions. We construct priors for people tracking usi...
Zhengdong Lu, Miguel Á. Carreira-Perpi&ntil...