Sciweavers

5948 search results - page 286 / 1190
» Computing Robust Counter-Strategies
Sort
View
INFOCOM
2008
IEEE
15 years 10 months ago
Robust Planarization of Unlocalized Wireless Sensor Networks
Abstract—Wireless sensor networks need very efficient network protocols due to the sensors’ limited communication and computation capabilities. Network planarization – find...
Fenghui Zhang, Anxiao Jiang, Jianer Chen
ICMCS
2006
IEEE
151views Multimedia» more  ICMCS 2006»
15 years 10 months ago
A Robust Method for TV Logo Tracking in Video Streams
Most broadcast stations rely on TV logos to claim video content ownership or visually distinguish the broadcast from the interrupting commercial block. Detecting and tracking a TV...
Jinqiao Wang, Lingyu Duan, Zhenglong Li, Jing Liu,...
MOBICOM
2006
ACM
15 years 10 months ago
Robust rate adaptation for 802.11 wireless networks
Rate adaptation is a mechanism unspecified by the 802.11 standards, yet critical to the system performance by exploiting the multi-rate capability at the physical layer. In this ...
Starsky H. Y. Wong, Songwu Lu, Hao Yang, Vaduvur B...
176
Voted
ICIAR
2005
Springer
15 years 10 months ago
Real-Time and Robust Background Updating for Video Surveillance and Monitoring
Abstract. Background updating is an important aspect of dynamic scene analysis. Two critical problems: sudden camera perturbation and the sleeping person problem, which arise frequ...
Xingzhi Luo, Suchendra M. Bhandarkar
IUI
2004
ACM
15 years 9 months ago
Robust sketched symbol fragmentation using templates
Analysis of sketched digital ink is often aided by the division of stroke points into perceptually-salient fragments based on geometric features. Fragmentation has many applicatio...
Heloise Hwawen Hse, Michael Shilman, A. Richard Ne...