Sciweavers

1228 search results - page 230 / 246
» Manipulation of Pose Distributions
Sort
View
GLOBECOM
2008
IEEE
15 years 4 months ago
TTL Based Packet Marking for IP Traceback
— Distributed Denial of Service Attacks continue to pose major threats to the Internet. In order to traceback attack sources (i.e., IP addresses), a well studied approach is Prob...
Vamsi Paruchuri, Arjan Durresi, Sriram Chellappan
WCNC
2008
IEEE
15 years 3 months ago
Optimal Strategies for Cooperative MAC-Layer Retransmission in Wireless Networks
—The concept of cooperative retransmission in wireless networks has attracted considerable research attention. The basic idea is that when a receiver cannot decode a frame, the r...
Lixiang Xiong, Lavy Libman, Guoqiang Mao
IROS
2007
IEEE
175views Robotics» more  IROS 2007»
15 years 3 months ago
Simulation and weights of multiple cues for robust object recognition
Reliable recognition of objects is an important capabaility in the progress towards getting agents to accomplish and assist in a variety of useful tasks such as search and rescue ...
Sarah Aboutalib, Manuela M. Veloso
84
Voted
SAINT
2007
IEEE
15 years 3 months ago
Towards a Mobile Peer-to-Peer Service Platform
Peer-to-Peer (P2P) technology is regarded as being disruptive for traditional fixed and mobile operators. However, it can also be considered as an opportunity for new ways of serv...
Wolfgang Kellerer, Zoran Despotovic, Maximilian Mi...
ATAL
2007
Springer
15 years 3 months ago
Towards using multiple cues for robust object recognition
A robot’s ability to assist humans in a variety of tasks, e.g. in search and rescue or in a household, heavily depends on the robot’s reliable recognition of the objects in th...
Sarah Aboutalib, Manuela M. Veloso