Sciweavers

9186 search results - page 1624 / 1838
» A Module System for Scheme
Sort
View
116
Voted
ICPR
2008
IEEE
15 years 7 months ago
Recognizing picture-taking environment from satellite images: A feasibility study
Semantic event recognition based only on vision cues has had limited success on unconstrained still pictures. Metadata related to picture taking provides contextual cues independe...
Jiebo Luo, Wei Hao, Dale McIntyre, Dhiraj Joshi, J...
125
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
Probabilistic Approach to Provisioning Guaranteed QoS for Distributed Event Detection
—It has been of significant importance to provision network-wide guaranteed QoS for a wide range of event detection applications in wireless sensor networks (WSNs). This paper in...
Yanmin Zhu, Lionel M. Ni
235
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
AdapCode: Adaptive Network Coding for Code Updates in Wireless Sensor Networks
—Code updates, such as those for debugging purposes, are frequent and expensive in the early development stages of wireless sensor network applications. We propose AdapCode, a re...
I-Hong Hou, Yu-En Tsai, Tarek F. Abdelzaher, Indra...
94
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
Achieving Honest Ratings with Reputation-Based Fines in Electronic Markets
—The effectiveness of online feedback mechanisms for rating the performance of providers in electronic markets is vulnerable to the submission of dishonest ratings. In this paper...
Thanasis G. Papaioannou, George D. Stamoulis
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 7 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
« Prev « First page 1624 / 1838 Last » Next »