Sciweavers

5465 search results - page 895 / 1093
» Assigning Types to Processes
Sort
View
147
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
112
Voted
ICMCS
2007
IEEE
122views Multimedia» more  ICMCS 2007»
15 years 7 months ago
Bit Depth Scalable Coding
Abstract-- In this paper, we propose an H.264/AVC compliant bitdepth scalable coding solution. Our codec is capable of presenting an 8-bit AVC main profile or high profile base lay...
Yuwen Wu, Yongying Gao, Ying Chen
3DPVT
2006
IEEE
231views Visualization» more  3DPVT 2006»
15 years 7 months ago
Simplified Belief Propagation for Multiple View Reconstruction
We address multiple-view reconstruction under an optimization approach based on belief propagation. A novel formulation of belief propagation that operates in 3-D is proposed to f...
E. Scott Larsen, Philippos Mordohai, Marc Pollefey...
144
Voted
3DPVT
2004
IEEE
136views Visualization» more  3DPVT 2004»
15 years 7 months ago
A Unified Representation for Interactive 3D Modeling
Interactive 3D modeling is the process of building a 3D model of an object or a scene in real-time while the 3D (range) data is acquired. This is possible only if the computationa...
Dragan Tubic, Patrick Hébert, Jean-Daniel D...
147
Voted
ANTSW
2006
Springer
15 years 7 months ago
An Energy-Efficient Ant-Based Routing Algorithm for Wireless Sensor Networks
Abstract. Wireless Sensor Networks are characterized by having specific requirements such as limited energy availability, low memory and reduced processing power. On the other hand...
Tiago Camilo, Carlos Carreto, Jorge Sá Silv...