Sciweavers

5948 search results - page 1189 / 1190
» Computing Robust Counter-Strategies
Sort
View
COMCOM
2004
153views more  COMCOM 2004»
14 years 9 months ago
BLR: beacon-less routing algorithm for mobile ad hoc networks
Routing of packets in mobile ad hoc networks with a large number of nodes or with high mobility is a very difficult task and current routing protocols do not really scale well wit...
Marc Heissenbüttel, Torsten Braun, Thomas Ber...
GI
2005
Springer
15 years 3 months ago
Kooperative Roboter im studentischen Softwarepraktikum
: Die Arbeitsgruppe Echtzeitsysteme und Kommunikation an der Fakultät für Informatik der Otto-von-Guericke-Universität Magdeburg nutzt die Attraktivität von Roboterbaukästen, ...
Edgar Nett, Manuela Kanneberg
GI
2008
Springer
14 years 10 months ago
Von der Accountverwaltung zum erweiterten Identity Management
Abstract: Das Identity Management (IDM) an Hochschulen ist in der Praxis angekommen und muss sich in der Realit¨at bew¨ahren. Hierzu z¨ahlt einerseits die Integration von Datenb...
Tarik Gasmi, Gerhard Schneider, Dirk von Suchodole...
SIGCOMM
2010
ACM
14 years 10 months ago
NeuroPhone: brain-mobile phone interface using a wireless EEG headset
Neural signals are everywhere just like mobile phones. We propose to use neural signals to control mobile phones for hands-free, silent and effortless human-mobile interaction. Un...
Andrew T. Campbell, Tanzeem Choudhury, Shaohan Hu,...
TRECVID
2007
14 years 11 months ago
Determination of Shot Boundary in MPEG Videos for TRECVID 2007
TURED ABSTRACT Detection of shot boundary plays important roles in many video applications. Herein, a novel method on shot boundary detection from compressed video is proposed. Fir...
Jinchang Ren, Jianmin Jiang, Juan Chen
« Prev « First page 1189 / 1190 Last » Next »