Sciweavers

653 search results - page 98 / 131
» Enhancing Commitment Machines
Sort
View
ICC
2009
IEEE
107views Communications» more  ICC 2009»
15 years 6 months ago
Dynamic Resource Modeling for Heterogeneous Wireless Networks
— High variability of access resources in heterogenous wireless networks and limited computing power and battery life of mobile computing devices such as smartphones call for nov...
Dimitrios Tsamis, Tansu Alpcan, Jatinder Pal Singh...
ICRA
2009
IEEE
165views Robotics» more  ICRA 2009»
15 years 6 months ago
Robust servo-control for underwater robots using banks of visual filters
—We present an application of machine learning to the semi-automatic synthesis of robust servo-trackers for underwater robotics. In particular, we investigate an approach based o...
Junaed Sattar, Gregory Dudek
APPT
2009
Springer
15 years 6 months ago
Evaluating SPLASH-2 Applications Using MapReduce
MapReduce has been prevalent for running data-parallel applications. By hiding other non-functionality parts such as parallelism, fault tolerance and load balance from programmers,...
Shengkai Zhu, Zhiwei Xiao, Haibo Chen, Rong Chen, ...
ICB
2009
Springer
122views Biometrics» more  ICB 2009»
15 years 6 months ago
A New Fake Iris Detection Method
Recent research works have revealed that it is not difficult to spoof an automated iris recognition system using fake iris such as contact lens and paper print etc. Therefore, it i...
XiaoFu He, Yue Lu, Pengfei Shi
IEEEARES
2008
IEEE
15 years 6 months ago
Detecting Bots Based on Keylogging Activities
—A bot is a piece of software that is usually installed on an infected machine without the user’s knowledge. A bot is controlled remotely by the attacker under a Command and Co...
Yousof Al-Hammadi, Uwe Aickelin