Sciweavers

633 search results - page 72 / 127
» A Classified and Comparative Study of Edge Detection Algorit...
Sort
View
GLOBECOM
2009
IEEE
15 years 11 months ago
Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks
Abstract—Gray hole attacks (a.k.a selective forwarding attacks) are a special case of denial of service (DoS) attack, where a misbehaving mesh router just forwards a subset of th...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali
GECCO
2009
Springer
254views Optimization» more  GECCO 2009»
15 years 11 months ago
Agglomerative genetic algorithm for clustering in social networks
Size and complexity of data repositories collaboratively created by Web users generate a need for new processing approaches. In this paper, we study the problem of detection of ļ¬...
Marek Lipczak, Evangelos E. Milios
CVPR
2012
IEEE
13 years 7 months ago
The role of image understanding in contour detection
Many cues have been proposed for contour detection or image segmentation. These include low-level image gradients to high-level information such as the identity of the objects in ...
C. Lawrence Zitnick, Devi Parikh
IWRT
2007
167views Communications» more  IWRT 2007»
15 years 6 months ago
The Practicality of Multi-Tag RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Successful object identification is the primary o...
Leonid Bolotnyy, Scott Krize, Gabriel Robins
TON
2012
13 years 7 months ago
Independent Directed Acyclic Graphs for Resilient Multipath Routing
—In order to achieve resilient multipath routing we introduce the concept of Independent Directed Acyclic Graphs (IDAGs) in this study. Link-independent (Node-independent) DAGs s...
Sangman Cho, Theodore Elhourani, Srinivasan Ramasu...