Sciweavers

5948 search results - page 1016 / 1190
» Computing Robust Counter-Strategies
Sort
View
136
Voted
ADHOCNOW
2006
Springer
15 years 9 months ago
Performance Modeling of a Bottleneck Node in an IEEE 802.11 Ad-Hoc Network
This paper presents a performance analysis of wireless ad-hoc networks, with ieee 802.11 as the underlying wireless lan technology. wlan has, due to the fair radio resource sharin...
Hans van den Berg, Michel Mandjes, Frank Roijers
136
Voted
HRI
2006
ACM
15 years 9 months ago
Working with robots and objects: revisiting deictic reference for achieving spatial common ground
Robust joint visual attention is necessary for achieving a common frame of reference between humans and robots interacting multimodally in order to work together on realworld spat...
Andrew G. Brooks, Cynthia Breazeal
ICML
2006
IEEE
15 years 9 months ago
Multiclass reduced-set support vector machines
There are well-established methods for reducing the number of support vectors in a trained binary support vector machine, often with minimal impact on accuracy. We show how reduce...
Benyang Tang, Dominic Mazzoni
101
Voted
IMC
2006
ACM
15 years 9 months ago
Finding diversity in remote code injection exploits
Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a method...
Justin Ma, John Dunagan, Helen J. Wang, Stefan Sav...
126
Voted
MM
2006
ACM
119views Multimedia» more  MM 2006»
15 years 9 months ago
Model generation for video-based object recognition
This paper presents a novel approach to object recognition involving a sparse 2D model and matching using video. The model is generated on the basis of geometry and image measurab...
Humera Noor, Shahid H. Mirza, Yaser Sheikh, Amit J...
« Prev « First page 1016 / 1190 Last » Next »