Sciweavers

5948 search results - page 1029 / 1190
» Computing Robust Counter-Strategies
Sort
View
116
Voted
MIDDLEWARE
2005
Springer
15 years 9 months ago
I-RMI: Performance Isolation in Information Flow Applications
A problem with many distributed applications is their behavior in lieu of unpredictable variations in user request volumes or in available resources. This paper explores a performa...
Mohamed S. Mansour, Karsten Schwan
124
Voted
MLDM
2005
Springer
15 years 9 months ago
Unsupervised Learning of Visual Feature Hierarchies
We propose an unsupervised, probabilistic method for learning visual feature hierarchies. Starting from local, low-level features computed at interest point locations, the method c...
Fabien Scalzo, Justus H. Piater
137
Voted
NIME
2005
Springer
164views Music» more  NIME 2005»
15 years 9 months ago
Wireless Dance Control: PAIR and WISEAR
WISEAR (Wireless Sensor Array) is a Linux based Embeddedx86 TS- 5600 SBC (Single Board Computer) specifically configured for use with music, dance and video performance technologi...
Peter Swendsen, David Topper
142
Voted
NOSSDAV
2005
Springer
15 years 9 months ago
Peer-to-peer internet telephony using SIP
P2P systems inherently have high scalability, robustness and fault tolerance because there is no centralized server and the network self-organizes itself. This is achieved at the ...
Kundan Singh, Henning Schulzrinne
134
Voted
SCALESPACE
2005
Springer
15 years 9 months ago
Image Deblurring in the Presence of Salt-and-Pepper Noise
The problem of image deblurring in the presence of salt and pepper noise is considered. Standard image deconvolution algorithms, that are designed for Gaussian noise, do not perfor...
Leah Bar, Nir A. Sochen, Nahum Kiryati
« Prev « First page 1029 / 1190 Last » Next »