Sciweavers

205 search results - page 41 / 41
» Join point selectors
Sort
View
PAMI
2010
222views more  PAMI 2010»
13 years 3 months ago
Minimal Surfaces Extend Shortest Path Segmentation Methods to 3D
—Shortest paths have been used to segment object boundaries with both continuous and discrete image models. Although these techniques are well defined in 2D, the character of the...
Leo Grady
TKDE
2010
274views more  TKDE 2010»
13 years 3 months ago
Ranked Query Processing in Uncertain Databases
—Recently, many new applications, such as sensor data monitoring and mobile device tracking, raise up the issue of uncertain data management. Compared to “certain” data, the ...
Xiang Lian, Lei Chen 0002
WINET
2010
112views more  WINET 2010»
13 years 3 months ago
On routing with guaranteed delivery in three-dimensional ad hoc wireless networks
We study routing algorithms for three-dimensional ad hoc networks that guarantee delivery and are k-local, i.e., each intermediate node v’s routing decision only depends on knowl...
Stephane Durocher, David G. Kirkpatrick, Lata Nara...
MMS
2010
13 years 6 days ago
InstantLeap: an architecture for fast neighbor discovery in large-scale P2P VoD streaming
In large-scale peer-to-peer (P2P) Video-on-Demand (VoD) streaming applications, a fundamental challenge is to quickly locate new supplying peers whenever a VCR command is issued, ...
Xuanjia Qiu, Wei Huang, Chuan Wu, Francis C. M. La...
TIFS
2010
130views more  TIFS 2010»
13 years 4 days ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena