Sciweavers

5948 search results - page 1189 / 1190
» Computing Robust Counter-Strategies
Sort
View
101
Voted
COMCOM
2004
153views more  COMCOM 2004»
15 years 1 months ago
BLR: beacon-less routing algorithm for mobile ad hoc networks
Routing of packets in mobile ad hoc networks with a large number of nodes or with high mobility is a very difficult task and current routing protocols do not really scale well wit...
Marc Heissenbüttel, Torsten Braun, Thomas Ber...
90
Voted
GI
2005
Springer
15 years 6 months ago
Kooperative Roboter im studentischen Softwarepraktikum
: Die Arbeitsgruppe Echtzeitsysteme und Kommunikation an der Fakultät für Informatik der Otto-von-Guericke-Universität Magdeburg nutzt die Attraktivität von Roboterbaukästen, ...
Edgar Nett, Manuela Kanneberg
103
Voted
GI
2008
Springer
15 years 2 months ago
Von der Accountverwaltung zum erweiterten Identity Management
Abstract: Das Identity Management (IDM) an Hochschulen ist in der Praxis angekommen und muss sich in der Realit¨at bew¨ahren. Hierzu z¨ahlt einerseits die Integration von Datenb...
Tarik Gasmi, Gerhard Schneider, Dirk von Suchodole...
127
Voted
SIGCOMM
2010
ACM
15 years 1 months ago
NeuroPhone: brain-mobile phone interface using a wireless EEG headset
Neural signals are everywhere just like mobile phones. We propose to use neural signals to control mobile phones for hands-free, silent and effortless human-mobile interaction. Un...
Andrew T. Campbell, Tanzeem Choudhury, Shaohan Hu,...
126
Voted
TRECVID
2007
15 years 2 months ago
Determination of Shot Boundary in MPEG Videos for TRECVID 2007
TURED ABSTRACT Detection of shot boundary plays important roles in many video applications. Herein, a novel method on shot boundary detection from compressed video is proposed. Fir...
Jinchang Ren, Jianmin Jiang, Juan Chen
« Prev « First page 1189 / 1190 Last » Next »