Sciweavers

1566 search results - page 137 / 314
» Contification Using Dominators
Sort
View
ICDCS
2010
IEEE
15 years 1 months ago
Sifting through Network Data to Cull Activity Patterns with HEAPs
—Today’s large campus and enterprise networks are characterized by their complexity, i.e. containing thousands of hosts, and diversity, i.e. with various applications and usage...
Esam Sharafuddin, Yu Jin, Nan Jiang, Zhi-Li Zhang
CVPR
2009
IEEE
15 years 1 months ago
Depth from sliding projections
In this paper we present a novel method for 3D structure acquisition, based on structured light. Unlike classical structured light methods, in which a static projector illuminates...
Chris Hermans, Yannick Francken, Tom Cuypers, Phil...
HRI
2007
ACM
15 years 1 months ago
A dancing robot for rhythmic social interaction
This paper describes a robotic system that uses dance as a form of social interaction to explore the properties and importance of rhythmic movement in general social interaction. ...
Marek P. Michalowski, Selma Sabanovic, Hideki Kozi...
ICC
2007
IEEE
162views Communications» more  ICC 2007»
15 years 1 months ago
LSP and Back Up Path Setup in MPLS Networks Based on Path Criticality Index
This paper reports on a promising approach for solving problems found when Multi Protocol Label Switching (MPLS), soon to be a dominant protocol, is used in core network systems. D...
Ali Tizghadam, Alberto Leon-Garcia
ASAP
2004
IEEE
141views Hardware» more  ASAP 2004»
15 years 1 months ago
Evaluating Instruction Set Extensions for Fast Arithmetic on Binary Finite Fields
Binary finite fields GF(2n ) are very commonly used in cryptography, particularly in publickey algorithms such as Elliptic Curve Cryptography (ECC). On word-oriented programmable ...
A. Murat Fiskiran, Ruby B. Lee