Sciweavers

3095 search results - page 415 / 619
» Ubiquitous presence systems
Sort
View
AVSS
2007
IEEE
14 years 4 months ago
Detection of abandoned objects in crowded environments
With concerns about terrorism and global security on the rise, it has become vital to have in place efficient threat detection systems that can detect and recognize potentially da...
Medha Bhargava, Chia-Chih Chen, Michael S. Ryoo, J...
ECRTS
2007
IEEE
14 years 4 months ago
Thermal Faults Modeling Using a RC Model with an Application to Web Farms
Today’s CPUs consume a significant amount of power and generate a high amount of heat, requiring an active cooling system to support reliable operations. In case of cooling sys...
Alexandre P. Ferreira, Daniel Mossé, Jae C....
GLOBECOM
2007
IEEE
14 years 4 months ago
Directional MAC for 60 GHz Using Polarization Diversity Extension (DMAC-PDX)
— This paper proposes a directional medium access control (DMAC) algorithm for wireless communication networks operating in the 60 GHz bands. Wireless communications using the 60...
Ferhat Yildirim, Huaping Liu
ICRA
2007
IEEE
114views Robotics» more  ICRA 2007»
14 years 4 months ago
A Short Paper about Motion Safety
— Motion safety for robotic systems operating in the real world is critical (especially when their size and dynamics make them potentially harmful for themselves or their environ...
Thierry Fraichard
IPPS
2007
IEEE
14 years 4 months ago
Effects of Replica Placement Algorithms on Performance of structured Overlay Networks
In DHT-based P2P systems, Replication-based content distribution and load balancing strategies consists of such decisions as which files should be replicated, how many replicas sh...
Bassam A. Alqaralleh, Chen Wang, Bing Bing Zhou, A...