Sciweavers

5948 search results - page 934 / 1190
» Computing Robust Counter-Strategies
Sort
View
ECCV
2010
Springer
15 years 9 months ago
Non-Local Kernel Regression for Image and Video Restoration
This paper presents a non-local kernel regression (NL-KR) method for image and video restoration tasks, which exploits both the non-local self-similarity and local structural regul...
CVPR
2010
IEEE
15 years 9 months ago
Exploiting Global Connectivity Constraints for Reconstruction of 3D Line Segments from Images
Given a set of 2D images, we propose a novel approach for the reconstruction of straight 3D line segments that represent the underlying geometry of static 3D objects in the scene....
Arjun Jain, Christian Kurz, Thorsten Thormaehlen, ...
AINA
2010
IEEE
15 years 9 months ago
RBP: Reliable Broadcasting Protocol in Large Scale Mobile Ad Hoc Networks
—Conventional broadcasting protocols suffer from network congestion, frequent message losses and corruption of broadcast messages due to a vast number of duplicate packets transm...
Subrata Saha, Syed Rafiul Hussain, A. K. M. Ashiku...
DSN
2002
IEEE
15 years 9 months ago
Detection of Invalid Routing Announcement in the Internet
Network measurement has shown that a specific IP address prefix may be announced by more than one autonomous system (AS), a phenomenon commonly referred to as Multiple Origin AS...
Xiaoliang Zhao, Dan Pei, Lan Wang, Daniel Massey, ...
INFOCOM
2002
IEEE
15 years 9 months ago
Predicting Internet Network Distance with Coordinates-Based Approaches
— In this paper, we propose to use coordinates-based mechanisms in a peer-to-peer architecture to predict Internet network distance (i.e. round-trip propagation and transmission ...
T. S. Eugene Ng, Hui Zhang