Sciweavers

1509 search results - page 167 / 302
» Depth from Scattering
Sort
View
IJSN
2007
73views more  IJSN 2007»
15 years 4 months ago
Optimal worm-scanning method using vulnerable-host distributions
: Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random ...
Zesheng Chen, Chuanyi Ji
TIP
2008
126views more  TIP 2008»
15 years 4 months ago
Maximum-Entropy Expectation-Maximization Algorithm for Image Reconstruction and Sensor Field Estimation
Abstract--In this paper, we propose a maximum-entropy expectation-maximization (MEEM) algorithm. We use the proposed algorithm for density estimation. The maximum-entropy constrain...
Hunsop Hong, Dan Schonfeld
TVCG
1998
197views more  TVCG 1998»
15 years 4 months ago
A New Line Integral Convolution Algorithm for Visualizing Time-Varying Flow Fields
—New challenges on vector field visualization emerge as time-dependent numerical simulations become ubiquitous in the field of computational fluid dynamics (CFD). To visualize da...
Han-Wei Shen, David L. Kao
VLDB
2002
ACM
116views Database» more  VLDB 2002»
15 years 4 months ago
The Denodo Data Integration Platform
The world today is characterised by the proliferation of information sources available through media such as the WWW, databases, semi-structured files (e.g. XML documents), etc. N...
Alberto Pan, Juan Raposo, Manuel Álvarez, P...
150
Voted
WIOPT
2010
IEEE
15 years 2 months ago
Analysis and design of message ferry routes in sensor networks using polling models
—We consider a Ferry based Wireless Local Area Network (FWLAN), in which information is forwarded from a base station to sensors, or gathered from sensors to a base station using...
Veeraruna Kavitha, Eitan Altman