Sciweavers

8068 search results - page 1502 / 1614
» Java Data Objects
Sort
View
EWC
2011
98views more  EWC 2011»
14 years 4 months ago
Real-time triangulation of point streams
Hand-held laser scanners are commonly used in industry for reverse engineering and quality measurements. In this process, it is difficult for the human operator to scan the target...
Klaus Denker, Burkhard Lehner, Georg Umlauf
TDSC
2011
14 years 4 months ago
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
TMC
2011
119views more  TMC 2011»
14 years 4 months ago
Temporal Link Signature Measurements for Location Distinction
—We investigate location distinction, the ability of a receiver to determine when a transmitter has changed location, which has application for energy conservation in wireless se...
Neal Patwari, Sneha Kumar Kasera
WWW
2011
ACM
14 years 4 months ago
A demo search engine for products
Most product search engines today build on models of relevance devised for information retrieval. However, the decision mechanism that underlies the process of buying a product is...
Beibei Li, Anindya Ghose, Panagiotis G. Ipeirotis
MTA
2011
260views Hardware» more  MTA 2011»
14 years 4 months ago
An audio watermarking scheme using singular value decomposition and dither-modulation quantization
Quantization index modulation is one of the best methods for performing blind watermarking, due to its simplicity and good rate-distortion-robustness tradeoffs. In this paper, a ne...
Vivekananda Bhat K., Indranil Sengupta, Abhijit Da...
« Prev « First page 1502 / 1614 Last » Next »