Sciweavers

2725 search results - page 350 / 545
» A framework for P2P application development
Sort
View
ICDCS
2011
IEEE
14 years 3 months ago
Localizing Multiple Jamming Attackers in Wireless Networks
Abstract—Jamming attacks and unintentional radio interference are one of the most urgent threats harming the dependability of wireless communication and endangering the successfu...
Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu
ICRA
2008
IEEE
297views Robotics» more  ICRA 2008»
15 years 10 months ago
Fast 3D reconstruction of human shape and motion tracking by parallel fast level set method
— This paper presents a parallel algorithm of the Level Set Method named the Parallel Fast Level Set Method, and its application for real-time 3D reconstruction of human shape an...
Yumi Iwashita, Ryo Kurazume, Kenji Hara, Seiichi U...
JCDL
2006
ACM
133views Education» more  JCDL 2006»
15 years 10 months ago
Repository software evaluation using the audit checklist for certification of trusted digital repositories
The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (...
Joanne Kaczmarek, Thomas G. Habing, Janet Eke
SEFM
2005
IEEE
15 years 9 months ago
On Compatibility and Behavioural Substitutability of Component Protocols
Component Based Development (CBD) aims to facilitate the construction of large-scale applications by supporting the composition of simple building blocks into complex applications...
Nabil Hameurlain
FPL
2006
Springer
156views Hardware» more  FPL 2006»
15 years 7 months ago
Improving Usability of FPGA-Based Reconfigurable Computers Through Operating System Support
Advances in FPGA-based reconfigurable computers have made them a viable computing platform for a vast variety of computation demanding areas such as bioinformatics, speech recogni...
Hayden Kwok-Hay So, Robert W. Brodersen