Sciweavers

8068 search results - page 1295 / 1614
» Java Data Objects
Sort
View
PE
2006
Springer
193views Optimization» more  PE 2006»
15 years 3 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
135
Voted
IJCV
2007
178views more  IJCV 2007»
15 years 3 months ago
Stereo for Image-Based Rendering using Image Over-Segmentation
In this paper, we propose a stereo method specifically designed for image-based rendering. For effective image-based rendering, the interpolated views need only be visually plaus...
C. Lawrence Zitnick, Sing Bing Kang
SPEECH
2008
109views more  SPEECH 2008»
15 years 3 months ago
DialogStudio: A workbench for data-driven spoken dialog system development and management
Recently, data-driven speech technologies have been widely used to build speech user interfaces. However, developing and managing data-driven spoken dialog systems are laborious a...
Sangkeun Jung, Cheongjae Lee, Seokhwan Kim, Gary G...
TCOM
2008
110views more  TCOM 2008»
15 years 3 months ago
Cross-layer Adaptive Transmission: Optimal Strategies in Fading Channels
We consider cross-layer adaptive transmission for a single-user system with stochastic data traffic and a timevarying wireless channel. The objective is to vary the transmit power ...
Anh Tuan Hoang, Mehul Motani
TII
2008
132views more  TII 2008»
15 years 3 months ago
Credential Management for Automatic Identification Solutions in Supply Chain Management
Current systems for automatic identification of goods presume a single administrative domain. However, in supply chain management systems temporary cooperations of multiple compani...
Marcel Henseler, Michael Rossberg, Guenter Schaefe...
« Prev « First page 1295 / 1614 Last » Next »