Sciweavers

5948 search results - page 999 / 1190
» Computing Robust Counter-Strategies
Sort
View
232
Voted
FGCN
2008
IEEE
335views Communications» more  FGCN 2008»
15 years 10 months ago
Barycentric Location Estimation for Indoors Localization in Opportunistic Wireless Networks
The localization requirements for mobile nodes in wireless (sensor) networks are increasing. However, most research works are based on range measurements between nodes which are o...
GuoDong Kang, Tanguy Pérennou, Michel Diaz
126
Voted
FGR
2008
IEEE
255views Biometrics» more  FGR 2008»
15 years 10 months ago
Aligned Cluster Analysis for temporal segmentation of human motion
Temporal segmentation of human motion into actions is a crucial step for understanding and building computational models of human motion. Several issues contribute to the challeng...
Feng Zhou, Fernando De la Torre, Jessica K. Hodgin...
113
Voted
ICASSP
2008
IEEE
15 years 10 months ago
Toward a detector-based universal phone recognizer
In recent research, we have proposed a high-accuracy bottom-up detection-based paradigm for continuous phone speech recognition. The key component of our system was a bank of arti...
Sabato Marco Siniscalchi, Torbjørn Svendsen...
125
Voted
ICCCN
2008
IEEE
15 years 10 months ago
Improving Load Balancing with Multipath Routing
— Internet service providers have to provision network resources to optimize bandwidth utilization. Dynamic routing protocols take traffic variations into account to control the...
Pascal Mérindol, Jean-Jacques Pansiot, St&e...
148
Voted
ICDIM
2008
IEEE
15 years 10 months ago
Unsupervised key-phrases extraction from scientific papers using domain and linguistic knowledge
The domain of Digital Libraries presents specific challenges for unsupervised information extraction to support both the automatic classification of documents and the enhancement ...
Mikalai Krapivin, Maurizio Marchese, Andrei Yadran...