Sciweavers

1500 search results - page 1 / 300
» Expose or Not
Sort
View
GLOBECOM
2006
IEEE
13 years 10 months ago
The Head-of-Line Blocking Problem on Exposed Terminals in MANETs
— In Mobile Ad Hoc Networks (MANETs), the hidden and the exposed terminal problems affect the throughput of the Medium Access Control (MAC) protocols. Several MAC schemes have be...
Jing Deng, Yi Qian
ICIP
2006
IEEE
14 years 6 months ago
Motion Blur Identification Based on Differently Exposed Images
In this paper we introduce a new method of motion blur identification that relies on the availability of two, differently exposed, image shots of the same scene. The proposed appr...
Marius Tico, Mejdi Trimeche, Markku Vehvilainen
ELPUB
2006
ACM
13 years 10 months ago
An Easy Option? OAI Static Repositories as a Method of Exposing Publishers' Metadata to the Wider Information Environment
This paper introduces OAI static repository technology as a method by which publishers can expose their articlelevel metadata and thereby participate more fully in the wider infor...
R. John Robertson, Alan Dawson
ASPLOS
2009
ACM
14 years 5 months ago
CTrigger: exposing atomicity violation bugs from their hiding places
Multicore hardware is making concurrent programs pervasive. Unfortunately, concurrent programs are prone to bugs. Among different types of concurrency bugs, atomicity violation bu...
Soyeon Park, Shan Lu, Yuanyuan Zhou
PERCOM
2005
ACM
14 years 4 months ago
Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments
In pervasive computing environments, service discovery facilitates users to access network services by automating tedious manual configurations. When network services becomes perv...
Feng Zhu, Wei Zhu, Matt W. Mutka, Lionel M. Ni