Sciweavers

12766 search results - page 2506 / 2554
» collective
Sort
View
IEPOL
2010
130views more  IEPOL 2010»
15 years 1 months ago
Piracy or promotion? The impact of broadband Internet penetration on DVD sales
ABSTRACT Digital computer networks represent a disruptive technology, with the potential to create or destroy economic value in established industries. These opportunities and chal...
Michael D. Smith, Rahul Telang
IJRR
2010
135views more  IJRR 2010»
15 years 1 months ago
On the Design and Use of a Micro Air Vehicle to Track and Avoid Adversaries
The MAV '08 competition focused on the problem of using air and ground vehicles to locate and rescue hostages being held in a remote building. To execute this mission, a numbe...
Ruijie He, Abraham Bachrach, Michael Achtelik, Alb...
ALGOSENSORS
2010
Springer
15 years 3 months ago
From Key Predistribution to Key Redistribution
One of crucial disadvantages of key predistribution schemes for ad hoc networks is that if devices A and B use a shared key K to determine their session keys, then any adversarial...
Jacek Cichon, Zbigniew Golebiewski, Miroslaw Kutyl...
CLOUDCOM
2010
Springer
15 years 1 months ago
Power of Clouds in Your Pocket: An Efficient Approach for Cloud Mobile Hybrid Application Development
The advancements in computing have resulted in a boom of cheap, ubiquitous, connected mobile devices as well as seemingly unlimited, utility style, pay as you go computing resourc...
Ashwin Manjunatha, Ajith Ranabahu, Amit P. Sheth, ...
CVPR
2011
IEEE
14 years 12 months ago
Unbiased Look at Dataset Bias
Datasets are an integral part of contemporary object recognition research. They have been the chief reason for the considerable progress in the field, not just as source of large...
Antonio Torralba, Alyosha Efros
« Prev « First page 2506 / 2554 Last » Next »