Sciweavers

1809 search results - page 219 / 362
» Weakly Computable Real Numbers
Sort
View
ICPADS
2006
IEEE
14 years 4 months ago
Coloring the Internet: IP Traceback
Several IP Traceback schemes employing packet marking have been proposed to trace DoS/DDoS attacks that use source address spoofing. The major challenges in the design of an ef...
Muthusrinivasan Muthuprasanna, G. Manimaran, Manso...
ATAL
2005
Springer
14 years 3 months ago
Controlling teams of uninhabited air vehicles
We describe a Multi-Agent System (MAS) for controlling teams of uninhabited air vehicles (UAVs) in the context of a larger system that has been used to evaluate potential concepts...
Jeremy W. Baxter, Graham S. Horn
ICDAR
2003
IEEE
14 years 3 months ago
A Neural-Evolutionary Approach for Feature and Architecture Selection in Online Handwriting Recognition
An automatic recognition of online handwritten text has been an on-going research problem for nearly four decades. It has been gaining more interest due to the increasing populari...
Brijesh Verma, Moumita Ghosh
DSOM
2003
Springer
14 years 3 months ago
A Method on Multimedia Service Traffic Monitoring and Analysis
The use of multimedia service applications is growing rapidly on the Internet. These applications are generating a huge volume of network traffic, which has a great impact on netw...
Hun-Jeong Kang, Myung-Sup Kim, James Won-Ki Hong
BCS
2008
13 years 11 months ago
Improved SIFT-Features Matching for Object Recognition
: The SIFT algorithm (Scale Invariant Feature Transform) proposed by Lowe [1] is an approach for extracting distinctive invariant features from images. It has been successfully app...
Faraj Alhwarin, Chao Wang, Danijela Ristic-Durrant...