Sciweavers

811 search results - page 23 / 163
» When Novelty Is Not Enough
Sort
View
ALGOSENSORS
2004
Springer
14 years 2 months ago
WiseMAC: An Ultra Low Power MAC Protocol for Multi-hop Wireless Sensor Networks
WiseMAC is a medium access control protocol designed for wireless sensor networks. This protocol is based on non-persistent CSMA and uses the preamble sampling technique to minimiz...
Amre El-Hoiydi, Jean-Dominique Decotignie
ECCV
2010
Springer
14 years 2 months ago
Local Occlusion Detection Under Deformations Using Topological Invariants
Occlusions provide critical cues about the 3D structure of man-made and natural scenes. We present a mathematical framework and algorithm to detect and localize occlusions in image...
ACSAC
2003
IEEE
14 years 1 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
HT
2003
ACM
14 years 1 months ago
Extracting evolution of web communities from a series of web archives
Recent advances in storage technology make it possible to store a series of large Web archives. It is now an exciting challenge for us to observe evolution of the Web. In this pap...
Masashi Toyoda, Masaru Kitsuregawa
ICCBR
2003
Springer
14 years 1 months ago
Efficient Real Time Maintenance of Retrieval Knowledge in Case-Based Reasoning
Abstract. In this paper, we investigate two novel indexing schemes called DHS and D-HS+PSR(II) designed for use in case-based reasoning systems. D-HS is based on a matrix of cases ...
David W. Patterson, Mykola Galushka, Niall Rooney