Sciweavers

1141 search results - page 73 / 229
» Analyzing Electroencephalograms Using Cloud Computing Techni...
Sort
View
ICC
2007
IEEE
113views Communications» more  ICC 2007»
15 years 10 months ago
Detection of Masquerade Attacks on Wireless Sensor Networks
— We propose two lightweight techniques to detect masquerade attacks on wireless sensor networks (WSN). Our solutions take into consideration, important WSN properties like cover...
Vijay Bhuse, Ajay K. Gupta, Ala I. Al-Fuqaha
101
Voted
ACIVS
2009
Springer
15 years 10 months ago
Comparing Feature Matching for Object Categorization in Video Surveillance
In this paper we consider an object categorization system using local HMAX features. Two feature matching techniques are compared: the MAX technique, originally proposed in the HMA...
Rob G. J. Wijnhoven, Peter H. N. de With
118
Voted
CVPR
2006
IEEE
16 years 5 months ago
Multi-View Stereo Revisited
We present an extremely simple yet robust multi-view stereo algorithm and analyze its properties. The algorithm first computes individual depth maps using a window-based voting ap...
Michael Goesele, Brian Curless, Steven M. Seitz
IPPS
2003
IEEE
15 years 9 months ago
Effective Utilization and Reconfiguration of Distributed Hardware Resources Using Job Management Systems
Reconfigurable hardware resources are very expensive, and yet can be underutilized. This paper describes a middleware capable of discovering underutilized computing nodes with FPG...
Kris Gaj, Tarek A. El-Ghazawi, Nikitas A. Alexandr...
142
Voted
ALGORITHMICA
2008
79views more  ALGORITHMICA 2008»
15 years 4 months ago
Practical Methods for Shape Fitting and Kinetic Data Structures using Coresets
The notion of -kernel was introduced by Agarwal et al. [5] to set up a unified framework for computing various extent measures of a point set P approximately. Roughly speaking, a ...
Hai Yu, Pankaj K. Agarwal, Raghunath Poreddy, Kast...