Sciweavers

5386 search results - page 1016 / 1078
» Approaches to Multimedia and Security
Sort
View
MM
2006
ACM
175views Multimedia» more  MM 2006»
15 years 3 months ago
Diversifying the image retrieval results
In the area of image retrieval, post-retrieval processing is often used to refine the retrieval results to better satisfy users’ requirements. Previous methods mainly focus on p...
Kai Song, YongHong Tian, Wen Gao, Tiejun Huang
NETGAMES
2006
ACM
15 years 3 months ago
Meeting technology challenges of pervasive augmented reality games
Pervasive games provide a new type of game combining new technologies with the real environment of the players. While this already poses new challenges to the game developer, requ...
Wolfgang Broll, Jan Ohlenburg, Irma Lindt, Iris He...
WOWMOM
2006
ACM
131views Multimedia» more  WOWMOM 2006»
15 years 3 months ago
Mobile Element Based Differentiated Message Delivery in Wireless Sensor Networks
In recent years, mobile elements (MEs) have been proposed as mechanical carriers of data to prolong the lifetime of sensor networks and to overcome network partitioning problem. A...
Yaoyao Gu, Doruk Bozdag, Eylem Ekici
RTSS
2005
IEEE
15 years 3 months ago
Multi-Granularity Resource Reservations
Resource reservation has been recently supported by many real-time operating systems to provide applications with guaranteed and timely access to system resources. Typically, rese...
Saowanee Saewong, Ragunathan Rajkumar
WORDS
2005
IEEE
15 years 3 months ago
Virtual Networks in an Integrated Time-Triggered Architecture
Depending on the physical structuring of large distributed safety-critical real-time systems, one can distinguish federated and integrated system architectures. This paper investi...
Roman Obermaisser, Philipp Peti, Hermann Kopetz
« Prev « First page 1016 / 1078 Last » Next »