Sciweavers

734 search results - page 121 / 147
» Computer Virus Propagation Models
Sort
View
CVPR
2010
IEEE
15 years 6 months ago
An Object-Dependent Hand Pose Prior from Sparse Training Data
In this paper, we propose a prior for hand pose estimation that integrates the direct relation between a manipulating hand and a 3d object. This is of particular interest for a va...
Henning Hamer, Juergen Gall, Thibaut Weise, Luc Va...
MOBICOM
2006
ACM
15 years 3 months ago
A MAC protocol for ad-hoc underwater acoustic sensor networks
A medium access control (MAC) protocol is proposed that is suitable for non-synchronized ad-hoc networks, and in particular for the energy-constrained underwater acoustic networks...
Borja Peleato, Milica Stojanovic
ADBIS
2000
Springer
131views Database» more  ADBIS 2000»
15 years 2 months ago
Mobile Transaction Management in Mobisnap
Abstract. In this paper we describe a transaction management system designed to face the inherent characteristics of mobile environments. Mobile clients cache subsets of the databa...
Nuno M. Preguiça, Carlos Baquero, Francisco...
DAC
1994
ACM
15 years 1 months ago
Error Diagnosis for Transistor-Level Verification
This paper describes a diagnosis technique for locating design errors in circuit implementations which do not match their functional specification. The method efficiently propagat...
Andreas Kuehlmann, David Ihsin Cheng, Arvind Srini...
EURONGI
2008
Springer
14 years 11 months ago
Connectivity Gateway Discovery in MANETs
Abstract. The integration of mobile ad hoc networks into IP-based access networks demands the presence of a gateway which is responsible for propagating some configuration paramete...
Antonio J. Yuste, Alicia Triviño-Cabrera, F...