Sciweavers

1498 search results - page 122 / 300
» Collection tree protocol
Sort
View
120
Voted
AVBPA
2003
Springer
134views Biometrics» more  AVBPA 2003»
15 years 8 months ago
Face Verification Competition on the XM2VTS Database
In the year 2000 a competition was organised to collect face verification results on an identical, publicly available data set using a standard evaluation protocol. The database us...
Kieron Messer, Josef Kittler, Mohammad Sadeghi, S&...
CORR
2010
Springer
153views Education» more  CORR 2010»
15 years 5 months ago
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the n...
P. Samundiswary, D. Sathian, P. Dananjayan
WWW
2007
ACM
16 years 5 months ago
Semi-automated adaptation of service interactions
In today's Web, many functionality-wise similar Web services are offered through heterogeneous interfaces (operation definitions) and business protocols (ordering constraints...
Hamid R. Motahari Nezhad, Boualem Benatallah, Axel...
GECCO
2009
Springer
148views Optimization» more  GECCO 2009»
15 years 11 months ago
Evolutionary optimization of multistage interconnection networks performance
The paper deals with optimization of collective communications on multistage interconnection networks (MINs). In the experimental work, unidirectional MINs like Omega, Butterfly a...
Jirí Jaros
CIKM
1997
Springer
15 years 9 months ago
The Need for Metrics in Visual Information Analysis
CT This paper explores several methods for visualizing the thematic content of large document collections. As opposed to traditional query-driven document retrieval, these methods ...
Nancy Miller, Elizabeth G. Hetzler, Grant Nakamura...