Sciweavers

6318 search results - page 1184 / 1264
» Data Leakage Detection
Sort
View
POPL
1997
ACM
15 years 6 months ago
Shape Types
Type systems currently available for imperative languages are too weak to detect a significant class of programming errors. For example, they cannot express the property that a l...
Pascal Fradet, Daniel Le Métayer
WCNC
2010
IEEE
15 years 5 months ago
Many-To-Many Communications via Space-Time Network Coding
—In this paper, the mutual cooperative communication between multiple nodes in a wireless network is efficiently achieved through a novel concept of Space-Time Network Coding (S...
Mohammed W. Baidas, Hung-Quoc Lai, K. J. Ray Liu
94
Voted
DCOSS
2006
Springer
15 years 5 months ago
Distance-Sensitive Information Brokerage in Sensor Networks
In a sensor network information from multiple nodes must usually be aggregated in order to accomplish a certain task. A natural way to view this information gathering is in terms o...
Stefan Funke, Leonidas J. Guibas, An Nguyen, Yusu ...
ECCV
2006
Springer
15 years 5 months ago
A Batch Algorithm for Implicit Non-rigid Shape and Motion Recovery
The recovery of 3D shape and camera motion for non-rigid scenes from single-camera video footage is a very important problem in computer vision. The low-rank shape model consists ...
Adrien Bartoli, Søren I. Olsen
127
Voted
ETFA
2006
IEEE
15 years 5 months ago
Verification of The Minimum Cost Forwarding Protocol for Wireless Sensor Networks
Wireless sensor networks (WSN) consist of small self-contained devices with computational, sensing and wireless communication capabilities. They allow flexible, powerful, tetherles...
William D. Henderson, Steven Tron
« Prev « First page 1184 / 1264 Last » Next »