Sciweavers

15792 search results - page 2978 / 3159
» Computational Abstraction Steps
Sort
View
SCIA
2007
Springer
182views Image Analysis» more  SCIA 2007»
15 years 6 months ago
The Statistical Properties of Local Log-Contrast in Natural Images
Abstract. The study of natural image statistics considers the statistical properties of large collections of images from natural scenes, and has applications in image processing, c...
Jussi T. Lindgren, Jarmo Hurri, Aapo Hyvärine...
109
Voted
TELETRAFFIC
2007
Springer
15 years 6 months ago
On the Interaction Between Internet Applications and TCP
Abstract. We focus in this paper on passive traffic measurement techniques that collect traces of TCP packets and analyze them to derive, for example, round-trip times or aggregate...
Matti Siekkinen, Guillaume Urvoy-Keller, Ernst W. ...
TELETRAFFIC
2007
Springer
15 years 6 months ago
Is ALOHA Causing Power Law Delays?
Abstract. Renewed interest in ALOHA-based Medium Access Control (MAC) protocols stems from their proposed applications to wireless ad hoc and sensor networks that require distribut...
Predrag R. Jelenkovic, Jian Tan
117
Voted
WEA
2007
Springer
114views Algorithms» more  WEA 2007»
15 years 6 months ago
Improving Tree Search in Phylogenetic Reconstruction from Genome Rearrangement Data
Abstract. A major task in evolutionary biology is to determine the ancestral relationships among the known species, a process generally referred as phylogenetic reconstruction. In ...
Fei Ye, Yan Guo, Andrew Lawson, Jijun Tang
121
Voted
WISTP
2007
Springer
15 years 6 months ago
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication
Abstract. For ubiquitous communication self-organising adhoc networks become more and more important. We consider mobile phones as appropriate secure gateways to provide access to ...
Walter Bamberger, Oliver Welter, Stephan Spitz
« Prev « First page 2978 / 3159 Last » Next »