Sciweavers

6181 search results - page 1081 / 1237
» Transactional Cluster Computing
Sort
View
167
Voted
ICDCS
2011
IEEE
14 years 2 months ago
Localizing Multiple Jamming Attackers in Wireless Networks
Abstract—Jamming attacks and unintentional radio interference are one of the most urgent threats harming the dependability of wireless communication and endangering the successfu...
Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu
164
Voted
ICDCSW
2011
IEEE
14 years 2 months ago
Link-Level Network Topology Generation
Abstract—Internet topology generation involves producing synthetic network topologies that imitate the characteristics of the Internet. Although the accuracy of newly developed n...
Mehmet Burak Akgun, Mehmet Hadi Gunes
289
Voted
CVPR
2012
IEEE
13 years 5 months ago
See all by looking at a few: Sparse modeling for finding representative objects
We consider the problem of finding a few representatives for a dataset, i.e., a subset of data points that efficiently describes the entire dataset. We assume that each data poi...
Ehsan Elhamifar, Guillermo Sapiro, René Vid...
215
Voted
CVPR
2012
IEEE
13 years 5 months ago
Robust visual tracking using autoregressive hidden Markov Model
Recent studies on visual tracking have shown significant improvement in accuracy by handling the appearance variations of the target object. Whereas most studies present schemes ...
Dong Woo Park, Junseok Kwon, Kyoung Mu Lee
CVPR
2012
IEEE
13 years 5 months ago
Robust camera self-calibration from monocular images of Manhattan worlds
We focus on the detection of orthogonal vanishing points using line segments extracted from a single view, and using these for camera self-calibration. Recent methods view this pr...
Horst Wildenauer, Allan Hanbury
« Prev « First page 1081 / 1237 Last » Next »