Sciweavers

809 search results - page 125 / 162
» Similarity, topology, and uniformity
Sort
View
ICPR
2008
IEEE
15 years 7 months ago
Non-rigid image registration based on the globally optimized correspondences
In this paper, we propose a new approach to the non-rigid image registration. This problem can be easily attacked if we can find regularly distributed correspondence points over ...
Hyung il Koo, Jung Gap Kuk, Nam Ik Cho
106
Voted
IEEEIAS
2008
IEEE
15 years 7 months ago
Information Assurance in Critical Infrastructures via Wireless Sensor Networks
Information assurance in critical infrastructure is an issue that has been addressed generally focusing on real-time or quasi real-time monitoring of the critical infrastructure; ...
Michele Albano, Stefano Chessa, Roberto Di Pietro
82
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
BAKE: A Balanced Kautz Tree Structure for Peer-to-Peer Networks
Abstract—In order to improve scalability and reduce maintenance overhead for structured Peer-to-Peer systems, researchers design optimal architectures with constant degree and lo...
Deke Guo, Yunhao Liu, Xiang-Yang Li
126
Voted
TRIDENTCOM
2008
IEEE
15 years 6 months ago
A quantitative evaluation of the MeshTest wireless testbed
The MeshTest testbed is designed to subject wireless devices and protocols to realistic and repeatable mobile scenarios, including multi-hop and disconnected topologies. The testb...
Brenton Walker, Charles Clancy
BROADNETS
2007
IEEE
15 years 6 months ago
Strategic deployment of network monitors for attack attribution
—Attacks launched over the Internet have become a pressing problem. Attackers make use of a variety of techniques to anonymize their traffic, in order to escape detection and pr...
Young June Pyun, Douglas S. Reeves