Sciweavers

6129 search results - page 1002 / 1226
» A parallel LLL algorithm
Sort
View
97
Voted
ICPADS
2005
IEEE
15 years 6 months ago
Automated Discovery of Brand Piracy on the Internet
The Internet has become a key instrument for establishing and promoting product brands. Companies are very interested in detecting any misuse of their logos, plagiarism, grey impo...
Ulrich Pinsdorf, Peter Ebinger
100
Voted
ICPADS
2005
IEEE
15 years 6 months ago
MeshTree: Reliable Low Delay Degree-bounded Multicast Overlays
We study decentralised low delay degree-constrained overlay multicast tree construction for single source real-time applications. This optimisation problem is NP-hard even if comp...
Su-Wei Tan, A. Gill Waters, John S. Crawford
100
Voted
ICRA
2005
IEEE
259views Robotics» more  ICRA 2005»
15 years 6 months ago
Flexible Microscope Calibration using Virtual Pattern for 3-D Telemicromanipulation
Abstract— In the context of virtualized reality based telemicromanipulation, we present in this paper a visual calibration technique for optical microscope coupled with a CCD cam...
Mehdi Ammi, Vincent Frémont, Antoine Ferrei...
CONCUR
2005
Springer
15 years 6 months ago
Constraint Solving for Contract-Signing Protocols
Research on the automatic analysis of cryptographic protocols has so far mainly concentrated on reachability properties, such as secrecy and authentication. Only recently it was sh...
Detlef Kähler, Ralf Küsters
DCOSS
2005
Springer
15 years 6 months ago
Multiple Controlled Mobile Elements (Data Mules) for Data Collection in Sensor Networks
Recent research has shown that using a mobile element to collect and carry data mechanically from a sensor network has many advantages over static multihop routing. We have an imp...
David Jea, Arun A. Somasundara, Mani B. Srivastava
« Prev « First page 1002 / 1226 Last » Next »