Sciweavers

8493 search results - page 1378 / 1699
» Implementing a distributed firewall
Sort
View
142
Voted
IKE
2007
15 years 6 months ago
Bringing Information Retrieval Back To Database Management Systems
Information retrieval emerged as independent research area from traditional database management system more than a decade ago. This was driven by the increasing functional require...
Khaled Nagi
MASCOTS
2007
15 years 6 months ago
A Hierarchical Connected Dominating Set Based Clustering Algorithm for Mobile Ad Hoc Networks
— We propose a hierarchical Connected Dominating Set (CDS) based algorithm for clustering in Mobile Ad hoc Networks (MANETs). Our algorithm is an extension of our previous Connec...
Deniz Cokuslu, Kayhan Erciyes
MVA
2007
132views Computer Vision» more  MVA 2007»
15 years 6 months ago
A Robust Coarse-to-Fine Method for Pupil Localization in Non-ideal Eye Images
Pupil localization is a very important preprocessing step in many machine vision applications. Accurate and robust pupil localization especially in non-ideal eye images (such as i...
Xiaoyan Yuan, Pengfei Shi
MVA
2007
193views Computer Vision» more  MVA 2007»
15 years 6 months ago
A Video Motion Capture System for Interactive Games
This paper presents a method for markerless human motion capture using a single camera. It uses tree-based filtering to efficiently propagate a probability distribution over pos...
Ryuzo Okada, Nobuhiro Kondoh, Björn Stenger
SIMUTOOLS
2008
15 years 6 months ago
Opportunistic networking in OMNeT++
This work describes mechanisms for simulating opportunistic and delay-tolerant networks in the OMNeT++ discrete event simulator. The mechanisms allow for simulating open systems o...
Ólafur Ragnar Helgason, Kristján Val...
« Prev « First page 1378 / 1699 Last » Next »