Sciweavers

1262 search results - page 185 / 253
» Fast Robust Hashing
Sort
View
ICIP
2003
IEEE
15 years 6 months ago
K-Voronoi diagrams computing in arbitrary domains
We propose a novel algorithm to compute Voronoi diagrams of order k in arbitrary 2D and 3D domains. The algorithm is based on a fast ordered propagation distance transformation ca...
Rubén Cárdenes, Simon K. Warfield, A...
RTSS
2003
IEEE
15 years 6 months ago
JAM: A Jammed-Area Mapping Service for Sensor Networks
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources available to network nodes and the ease with which attacks...
Anthony D. Wood, John A. Stankovic, Sang Hyuk Son
INFOCOM
2002
IEEE
15 years 6 months ago
Performance Optimization of VoIP Calls over Wireless Links Using H.323 Protocol
—Intelligent mobile terminals (or users) of next generation wireless networks are expected to initiate voice over IP (VoIP) calls using session set-up protocols like H.323 or SIP...
Sajal K. Das, Sanjoy K. Sen, Naveen K. Kakani
ICRA
1999
IEEE
126views Robotics» more  ICRA 1999»
15 years 5 months ago
Monte Carlo Localization for Mobile Robots
Mobile robot localization is the problem of determining a robot's pose from sensor data. This article presents a family of probabilisticlocalization algorithms known as Monte...
Frank Dellaert, Dieter Fox, Wolfram Burgard, Sebas...
ICALP
2010
Springer
15 years 3 months ago
How Efficient Can Gossip Be? (On the Cost of Resilient Information Exchange)
Gossip protocols, also known as epidemic dissemination schemes, are becoming increasingly popular in distributed systems. Yet, it has remained a partially open question to determin...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Mort...