Sciweavers

15073 search results - page 2717 / 3015
» Probabilistic algorithms for computing resultants
Sort
View
WCNC
2008
IEEE
15 years 10 months ago
A Density Adaptive Routing Protocol for Large-Scale Ad Hoc Networks
Abstract—Position-based routing protocols use location information to refine the traditional packet flooding method in mobile ad hoc networks. They mainly focus on densely and ...
Zhizhou Li, Yaxiong Zhao, Yong Cui, Dong Xiang
WCNC
2008
IEEE
15 years 10 months ago
Developing Security Solutions for Wireless Mesh Enterprise Networks
—Our study on the deployment topology and communication characteristics of wireless mesh enterprise networks (WMENs) leads to three critical security challenges: (a) deployment o...
Md. Abdul Hamid, Md. Shariful Islam, Choong Seon H...
AVSS
2007
IEEE
15 years 10 months ago
Scream and gunshot detection and localization for audio-surveillance systems
This paper describes an audio-based video surveillance system which automatically detects anomalous audio events in a public square, such as screams or gunshots, and localizes the...
Giuseppe Valenzise, Luigi Gerosa, Marco Tagliasacc...
CEC
2007
IEEE
15 years 10 months ago
On some symmetry based validity indices
—Identification of the correct number of clusters and the corresponding partitioning are two important considerations in clustering. In this paper, a newly developed point symme...
Sriparna Saha, Sanghamitra Bandyopadhyay
CIBCB
2007
IEEE
15 years 10 months ago
Multiple Sequence Alignment using Fuzzy Logic
—DNA matching is a crucial step in sequence alignment. Since sequence alignment is an approximate matching process there is a need for good approximate algorithms. The process of...
Sara Nasser, Gregory Vert, Monica N. Nicolescu, Al...
« Prev « First page 2717 / 3015 Last » Next »