Sciweavers

1141 search results - page 73 / 229
» Analyzing Electroencephalograms Using Cloud Computing Techni...
Sort
View
76
Voted
ICC
2007
IEEE
113views Communications» more  ICC 2007»
15 years 7 months ago
Detection of Masquerade Attacks on Wireless Sensor Networks
— We propose two lightweight techniques to detect masquerade attacks on wireless sensor networks (WSN). Our solutions take into consideration, important WSN properties like cover...
Vijay Bhuse, Ajay K. Gupta, Ala I. Al-Fuqaha
74
Voted
ACIVS
2009
Springer
15 years 7 months ago
Comparing Feature Matching for Object Categorization in Video Surveillance
In this paper we consider an object categorization system using local HMAX features. Two feature matching techniques are compared: the MAX technique, originally proposed in the HMA...
Rob G. J. Wijnhoven, Peter H. N. de With
87
Voted
CVPR
2006
IEEE
16 years 2 months ago
Multi-View Stereo Revisited
We present an extremely simple yet robust multi-view stereo algorithm and analyze its properties. The algorithm first computes individual depth maps using a window-based voting ap...
Michael Goesele, Brian Curless, Steven M. Seitz
108
Voted
IPPS
2003
IEEE
15 years 5 months ago
Effective Utilization and Reconfiguration of Distributed Hardware Resources Using Job Management Systems
Reconfigurable hardware resources are very expensive, and yet can be underutilized. This paper describes a middleware capable of discovering underutilized computing nodes with FPG...
Kris Gaj, Tarek A. El-Ghazawi, Nikitas A. Alexandr...
ALGORITHMICA
2008
79views more  ALGORITHMICA 2008»
15 years 21 days ago
Practical Methods for Shape Fitting and Kinetic Data Structures using Coresets
The notion of -kernel was introduced by Agarwal et al. [5] to set up a unified framework for computing various extent measures of a point set P approximately. Roughly speaking, a ...
Hai Yu, Pankaj K. Agarwal, Raghunath Poreddy, Kast...