Sciweavers

1898 search results - page 322 / 380
» Weak Keys for IDEA
Sort
View

Publication
232views
13 years 7 months ago
Measurement in 802.11 Wireless Networks and its Applications
Ease of deployment, wireless connectivity and ubiquitous mobile on-the-go computing has made the IEEE 802.11 the most widely deployed Wireless Local Area Network (WLAN) sta...
Malik Ahmad Yar Khan
C5
2003
IEEE
14 years 2 months ago
SuperSwiki - Bringing collaboration to the class room
SuperSwiki is a not yet well defined term. Its origins go back to Ward Cunningham's Wiki and its Squeak variant, the Swiki. It provides a place to share and edit web pages, f...
Michael Rüger
ICDE
2006
IEEE
183views Database» more  ICDE 2006»
14 years 2 months ago
Similarity Queries on Structured Data in Structured Overlays
Structured P2P systems based on distributed hash tables are a popular choice for building large-scaled data management systems. Generally, they only support exact match queries, b...
Marcel Karnstedt, Kai-Uwe Sattler, Manfred Hauswir...
CVPR
2009
IEEE
1468views Computer Vision» more  CVPR 2009»
15 years 4 months ago
Hardware-Efficient Belief Propagation
Belief propagation (BP) is an effective algorithm for solving energy minimization problems in computer vision. However, it requires enormous memory, bandwidth, and computation beca...
Chao-Chung Cheng, Chia-Kai Liang, Homer H. Chen, L...
CVPR
2006
IEEE
14 years 10 months ago
Edge Suppression by Gradient Field Transformation Using Cross-Projection Tensors
We propose a new technique for edge-suppressing operations on images. We introduce cross projection tensors to achieve affine transformations of gradient fields. We use these tens...
Amit K. Agrawal, Ramesh Raskar, Rama Chellappa