Sciweavers

1150 search results - page 115 / 230
» Algorithmic transforms for efficient energy scalable computa...
Sort
View
169
Voted
MOBIHOC
2005
ACM
16 years 4 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning
ICCV
2003
IEEE
16 years 6 months ago
A Segmentation Algorithm for Contrast-Enhanced Images
Medical imaging often involves the injection of contrast agents and the subsequent analysis of tissue enhancement patterns. Many important types of tissue have characteristic enha...
Junhwan Kim, Ramin Zabih
CVPR
2012
IEEE
13 years 7 months ago
An online learned CRF model for multi-target tracking
We introduce an online learning approach for multitarget tracking. Detection responses are gradually associated into tracklets in multiple levels to produce final tracks. Unlike ...
Bo Yang, Ram Nevatia
121
Voted
GECCO
2003
Springer
15 years 9 months ago
DNA-Like Genomes for Evolution in silico
We explore the advantages of DNA-like genomes for evolutionary computation in silico. Coupled with simulations of chemical reactions, these genomes offer greater efficiency, reliab...
Michael West, Max H. Garzon, Derrel Blain
CONCURRENCY
2002
99views more  CONCURRENCY 2002»
15 years 4 months ago
A distributed computing environment for interdisciplinary applications
Practical applications are generally interdisciplinary in nature. The technology is well matured for addressing individual discipline applications and not for interdisciplinary ap...
Jerry A. Clarke, Raju R. Namburu