Sciweavers

661 search results - page 82 / 133
» Robustness Guarantees for Anonymity
Sort
View
69
Voted
ISCC
2006
IEEE
109views Communications» more  ISCC 2006»
15 years 6 months ago
A Call Level Adaptive Bandwidth Allocation Scheme Based on Lyapunov Control Theory
— In this paper, we propose an adaptive capacity allocation scheme at the call level for a blocked call cleared loss system. The scheme aims to maintain the connection blocking p...
Hesham Bin-Abbas, David Tipper
124
Voted
WOWMOM
2006
ACM
149views Multimedia» more  WOWMOM 2006»
15 years 6 months ago
On-Demand Reliable Medium Access in Sensor Networks
A wireless sensor network typically consists of a dense deployment of sensor nodes to achieve higher resolution and better network coverage. A dense network also increases the fau...
Ratnabali Biswas, Vivek Jain, Chittabrata Ghosh, D...
114
Voted
ICIP
2005
IEEE
15 years 6 months ago
Variational multi-wavelet restoration of noisy images
This paper presents a new technique for noise removal in images. It benefits both from the recent advances in waveletbased and variational denoising. Whereas wavelet-based analys...
Ronan Fablet, Jean-Marie Augustin
IBPRIA
2005
Springer
15 years 6 months ago
An Algorithm for the Detection of Multiple Concentric Circles
This paper presents a method for the detection of multiple concentric circles which is based on the Hough Transform (HT). In order to reduce time and memory space the concentric ci...
Margarida Silveira
124
Voted
COMPGEOM
2004
ACM
15 years 6 months ago
Deterministic sampling and range counting in geometric data streams
We present memory-efficient deterministic algorithms for constructing -nets and -approximations of streams of geometric data. Unlike probabilistic approaches, these deterministic...
Amitabha Bagchi, Amitabh Chaudhary, David Eppstein...