Sciweavers

5592 search results - page 156 / 1119
» On Random Betweenness Constraints
Sort
View
148
Voted
INFOCOM
2008
IEEE
15 years 11 months ago
Throughput Anonymity Trade-off in Wireless Networks under Latency Constraints
—Providing anonymity to routes in a wireless ad hoc network from passive eavesdroppers is considered. Using Shannon’s equivocation as an information theoretic measure of anonym...
Parvathinathan Venkitasubramaniam, Lang Tong
IJCNN
2006
IEEE
15 years 11 months ago
Constraints on the Design Process for Systems with Human Level Intelligence
—Any system which must learn to perform a large number of behavioral features with limited information handling resources will tend to be constrained within a set of architectura...
L. Andrew Coward
158
Voted
GI
2005
Springer
15 years 10 months ago
RFID middleware design - addressing both application needs and RFID constraints
: Radio Frequency Identification (RFID) technology has a lot of potential to bridge the gap between the virtual world of enterprise IT systems and the real world of products and l...
Christian Floerkemeier, Matthias Lampe
120
Voted
ICPR
2000
IEEE
15 years 9 months ago
Face Detection Based on Generic Local Descriptors and Spatial Constraints
In this paper we present an algorithm for face detection that is based on generic local descriptors (e.g. eyes). A generic descriptor captures the distribution of individual descr...
Veronika Vogelhuber, Cordelia Schmid
CIAC
2010
Springer
282views Algorithms» more  CIAC 2010»
15 years 8 months ago
Improved Approximations for TSP with Simple Precedence Constraints
In this paper, we consider variants of the traveling salesman problem with precedence constraints. We characterize hard input instances for Christofides' algorithm and Hoogeve...
Hans-Joachim Boeckenhauer, Ralf Klasing, Tobias Mo...