Sciweavers

345 search results - page 43 / 69
» When Systems Loose their Identity
Sort
View
CVPR
2007
IEEE
16 years 7 months ago
Shadow Removal in Front Projection Environments Using Object Tracking
When an occluding object, such as a person, stands between a projector and a display surface, a shadow results. We can compensate by positioning multiple projectors so they produc...
Samuel Audet, Jeremy R. Cooperstock
VTC
2007
IEEE
100views Communications» more  VTC 2007»
15 years 11 months ago
Downlink Steered Space-Time Spreading Assisted Generalised Multicarrier DS-CDMA Using Sphere-Packing-Aided Multilevel Coding
— This paper presents a novel generalised Multi-Carrier Direct Sequence Code Division Multiple Access (MC DS-CDMA) system invoking smart antennas for improving the achievable per...
Mohammed El-Hajjar, Ronald Y. S. Tee, Hu Bin, Lie-...
AUSDM
2007
Springer
110views Data Mining» more  AUSDM 2007»
15 years 11 months ago
Adaptive Spike Detection for Resilient Data Stream Mining
Automated adversarial detection systems can fail when under attack by adversaries. As part of a resilient data stream mining system to reduce the possibility of such failure, adap...
Clifton Phua, Kate Smith-Miles, Vincent C. S. Lee,...
AVSS
2006
IEEE
15 years 11 months ago
Optimal Power Scheduling for Data Fusion in Inhomogeneous Wireless Sensor Networks
We consider the problem of optimal power scheduling for the decentralized detection of a deterministic signal in an inhomogeneous wireless sensor network. The observation noise at...
Thakshila Wimalajeewa, Sudharman K. Jayaweera
ESCIENCE
2006
IEEE
15 years 9 months ago
Authorizing Remote Job Execution Based on Job Properties
: E-Science often requires access to remote Grid computing platforms. Current authorization systems on these remote systems have largely based decisions solely on the identity of t...
Sang-Min Park, Glenn S. Wasson, Marty Humphrey