Sciweavers

1809 search results - page 282 / 362
» Weakly Computable Real Numbers
Sort
View
CCS
2008
ACM
13 years 11 months ago
Dependent link padding algorithms for low latency anonymity systems
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...
Wei Wang 0002, Mehul Motani, Vikram Srinivasan
IMC
2007
ACM
13 years 10 months ago
Studying wireless routing link metric dynamics
Multi-hop wireless mesh networks are increasingly being deployed for last-mile Internet access. Typically, network algorithms such as routing, channel assignment and topology cont...
Saumitra M. Das, Himabindu Pucha, Konstantina Papa...
CIMAGING
2010
122views Hardware» more  CIMAGING 2010»
13 years 10 months ago
Symmetrized local co-registration optimization for anomalous change detection
The goal of anomalous change detection (ACD) is to identify what unusual changes have occurred in a scene, based on two images of the scene taken at different times and under diff...
Brendt Wohlberg, James Theiler
CSREAESA
2008
13 years 10 months ago
Real-time Embedded Architecture for Advanced Service Robots
In most advanced real-time control applications such as service robots, the tasks have different criticality, flexible timing constraints and variable execution time. For instance...
David Ramada, Carlos Domínguez, Houcine Has...
IADIS
2008
13 years 10 months ago
Subspace Orthogonal Projection for Texture Segmentation with Wavelet Frames
We propose a new supervised texture segmentation and classification technique based on combining features extracted from the discrete wavelet frames of an image (specifically, the...
Mahmoud K. Quweider