Sciweavers

773 search results - page 114 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
SIGCOMM
2006
ACM
15 years 8 months ago
Policy-based routing with non-strict preferences
Traditional studies of routing problems often assumed strict preferences on paths, by eliminating ambiguity in path comparisons, or imposing a priori deterministic tie-breaking. S...
Chi-kin Chau
AVSS
2005
IEEE
15 years 7 months ago
An effective real-time mosaicing algorithm apt to detect motion through background subtraction using a PTZ camera
Nowadays, many visual surveillance systems exploit PTZ camera to increase the field of view of a surveyed area. The background subtraction technique is widespread to detect movin...
Pietro Azzari, Luigi di Stefano, Alessandro Bevila...
CRV
2005
IEEE
201views Robotics» more  CRV 2005»
15 years 7 months ago
Minimum Bayes Error Features for Visual Recognition by Sequential Feature Selection and Extraction
The extraction of optimal features, in a classification sense, is still quite challenging in the context of large-scale classification problems (such as visual recognition), inv...
Gustavo Carneiro, Nuno Vasconcelos
IPPS
2005
IEEE
15 years 7 months ago
GUARD: Gossip Used for Autonomous Resource Detection
A growing trend in the development and deployment of grid computing systems is decentralization. Decentralizing these systems helps make them more scalable and robust, but poses s...
Sagnik Nandy, Larry Carter, Jeanne Ferrante
DCOSS
2005
Springer
15 years 7 months ago
Using Clustering Information for Sensor Network Localization
Sensor network localization continues to be an important research challenge. The goal of localization is to assign geographic coordinates to each node in the sensor network. Locali...
Haowen Chan, Mark Luk, Adrian Perrig