Sciweavers

27354 search results - page 5265 / 5471
» Distributed And Parallel Computing
Sort
View
83
Voted
CCS
2008
ACM
15 years 8 days ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
97
Voted
CIKM
2008
Springer
15 years 8 days ago
On low dimensional random projections and similarity search
Random projection (RP) is a common technique for dimensionality reduction under L2 norm for which many significant space embedding results have been demonstrated. However, many si...
Yu-En Lu, Pietro Liò, Steven Hand
115
Voted
3DIM
2005
IEEE
15 years 7 days ago
Bayesian Modelling of Camera Calibration and Reconstruction
Camera calibration methods, whether implicit or explicit, are a critical part of most 3D vision systems. These methods involve estimation of a model for the camera that produced t...
Rashmi Sundareswara, Paul R. Schrater
98
Voted
ACMSE
2006
ACM
15 years 7 days ago
Phoenix-based clone detection using suffix trees
A code clone represents a sequence of statements that are duplicated in multiple locations of a program. Clones often arise in source code as a result of multiple cut/paste operat...
Robert Tairas, Jeff Gray
114
Voted
BROADNETS
2006
IEEE
15 years 7 days ago
On the Broadcast Storm Problem in Ad hoc Wireless Networks
Routing protocols developed for ad hoc wireless networks use broadcast transmission to either discover a route or disseminate information. More specifically, reactive routing proto...
Ozan K. Tonguz, Nawaporn Wisitpongphan, Jayendra S...
« Prev « First page 5265 / 5471 Last » Next »