Sciweavers

5275 search results - page 213 / 1055
» Computing by observing
Sort
View
DCOSS
2009
Springer
15 years 10 months ago
Online Coding for Reliable Data Transfer in Lossy Wireless Sensor Networks
Bulk transport underlies data exfiltration and code update facilities in WSNs, but existing approaches are not designed for highly lossy and variable-quality links. We observe tha...
Anthony D. Wood, John A. Stankovic
FCT
2009
Springer
15 years 10 months ago
On Random Betweenness Constraints
Despite of their applicability betweennness constraints have (to the author’s knowledge) hardly been considered from the random structures point of view. They are essentially di...
Andreas Goerdt
ISMM
2009
Springer
15 years 10 months ago
Fast Implementation of the Ultimate Opening
Abstract. We present an efficient implementation of the ultimate attribute opening operator. In this implementation, the ultimate opening is computed by processing the image maxtre...
Jonathan Fabrizio, Beatriz Marcotegui
NETCOOP
2009
Springer
15 years 10 months ago
Understanding and Preventing Tacit Collusion among Telecommunication Operators
Abstract. Modeling the competition among telecommunication operators (or providers) as a repeated game may explain why tacit collusion to maintain high charging prices can be obser...
Patrick Maillé, Maurizio Naldi, Bruno Tuffi...
ICPR
2008
IEEE
15 years 10 months ago
A non-parametric scale-based corner detector
This paper introduces a new Harris-affine corner detector algorithm, that does not need parameters to locate corners in images, given an observation scale. Standard detectors req...
Fabio Bellavia, Domenico Tegolo, Cesare Valenti