Sciweavers

5804 search results - page 1145 / 1161
» Doing more with less
Sort
View
BMVC
2010
14 years 9 months ago
Person Re-Identification by Support Vector Ranking
Solving the person re-identification problem involves matching observations of individuals across disjoint camera views. The problem becomes particularly hard in a busy public sce...
Bryan Prosser, Wei-Shi Zheng, Shaogang Gong, Tao X...
EMISA
2010
Springer
14 years 9 months ago
Supporting ad hoc Analyses on Enterprise Models
Abstract: Enterprises are socio technical systems whose management involves multiple stakeholders each demanding for a distinct perspective on the enterprise. A large number of mod...
Sabine Buckl, Jens Gulden, Christian M. Schweda
GLOBECOM
2010
IEEE
14 years 9 months ago
Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks
Primary user emulation attack (PUEA) is a denial of service (DoS) attack unique to dynamic spectrum access (DSA) networks. While there have been studies in the literature to detect...
Z. Jin, S. Anand, K. P. Subbalakshmi
GLOBECOM
2010
IEEE
14 years 9 months ago
A Distributed Wake-Up Scheduling for Opportunistic Forwarding in Wireless Sensor Networks
In wireless sensor networks (WSNs), sensor nodes are typically subjected to energy constraints and often prone to topology changes. While duty cycling has been widely used for ener...
Chul-Ho Lee, Do Young Eun
INFOCOM
2010
IEEE
14 years 9 months ago
Reliable Wireless Broadcasting with Near-Zero Feedback
We examine the problem of minimizing feedbacks in reliable wireless broadcasting, by pairing rateless coding with extreme value theory. Our key observation is that, in a broadcast ...
Weiyao Xiao, Sachin Agarwal, David Starobinski, Ar...
« Prev « First page 1145 / 1161 Last » Next »