Sciweavers

36320 search results - page 7067 / 7264
» From Code to Models
Sort
View
144
Voted
SECURWARE
2008
IEEE
15 years 10 months ago
ToLeRating UR-STD
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approac...
Jan Feyereisl, Uwe Aickelin
SSDBM
2008
IEEE
149views Database» more  SSDBM 2008»
15 years 10 months ago
Query Planning for Searching Inter-dependent Deep-Web Databases
Increasingly, many data sources appear as online databases, hidden behind query forms, thus forming what is referred to as the deep web. It is desirable to have systems that can pr...
Fan Wang, Gagan Agrawal, Ruoming Jin
SUTC
2008
IEEE
15 years 10 months ago
Training Data Compression Algorithms and Reliability in Large Wireless Sensor Networks
With the availability of low-cost sensor nodes there have been many standards developed to integrate and network these nodes to form a reliable network allowing many different typ...
Vasanth Iyer, Rammurthy Garimella, M. B. Srinivas
VTC
2008
IEEE
137views Communications» more  VTC 2008»
15 years 10 months ago
A Multi-Hop Polling Service with Bandwidth Request Aggregation in IEEE 802.16j Networks
— The IEEE 802.16j protocol for a multi-hop relay (MMR) WiMAX network is being developed to increase data rates and extend service coverage as an enhancement of existing WiMAX st...
Chun Nie, Thanasis Korakis, Shivendra S. Panwar
3DIM
2007
IEEE
15 years 10 months ago
Light stripe triangulation for multiple of moving rigid objects
In this paper, we propose an extension of light stripe triangulation for multiple of moving rigid objects. With traditional light stripe triangulation, the acquired shape of movin...
Takuya Funatomi, Masaaki Iiyama, Koh Kakusho, Mich...
« Prev « First page 7067 / 7264 Last » Next »