Sciweavers

1898 search results - page 322 / 380
» Weak Keys for IDEA
Sort
View

Publication
232views
15 years 2 months ago
Measurement in 802.11 Wireless Networks and its Applications
Ease of deployment, wireless connectivity and ubiquitous mobile on-the-go computing has made the IEEE 802.11 the most widely deployed Wireless Local Area Network (WLAN) sta...
Malik Ahmad Yar Khan
C5
2003
IEEE
15 years 9 months ago
SuperSwiki - Bringing collaboration to the class room
SuperSwiki is a not yet well defined term. Its origins go back to Ward Cunningham's Wiki and its Squeak variant, the Swiki. It provides a place to share and edit web pages, f...
Michael Rüger
ICDE
2006
IEEE
183views Database» more  ICDE 2006»
15 years 10 months ago
Similarity Queries on Structured Data in Structured Overlays
Structured P2P systems based on distributed hash tables are a popular choice for building large-scaled data management systems. Generally, they only support exact match queries, b...
Marcel Karnstedt, Kai-Uwe Sattler, Manfred Hauswir...
CVPR
2009
IEEE
1468views Computer Vision» more  CVPR 2009»
16 years 11 months ago
Hardware-Efficient Belief Propagation
Belief propagation (BP) is an effective algorithm for solving energy minimization problems in computer vision. However, it requires enormous memory, bandwidth, and computation beca...
Chao-Chung Cheng, Chia-Kai Liang, Homer H. Chen, L...
CVPR
2006
IEEE
16 years 6 months ago
Edge Suppression by Gradient Field Transformation Using Cross-Projection Tensors
We propose a new technique for edge-suppressing operations on images. We introduce cross projection tensors to achieve affine transformations of gradient fields. We use these tens...
Amit K. Agrawal, Ramesh Raskar, Rama Chellappa