Sciweavers

804 search results - page 119 / 161
» Solutions to Computational Problems Through Gene Assembly
Sort
View
MIDDLEWARE
2007
Springer
15 years 6 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt
97
Voted
AGI
2008
15 years 2 months ago
Temporal Action Logic for Question Answering in an Adventure Game
Inhabiting the complex and dynamic environments of modern computer games with autonomous agents capable of intelligent timely behaviour is a significant research challenge. We illu...
Martin Magnusson, Patrick Doherty
ISCI
2002
132views more  ISCI 2002»
15 years 8 days ago
Mobile data and transaction management
Mobile computing paradigm has emerged due to advances in wireless or cellular networking technology. This rapidly expanding technology poses many challenging research problems in ...
Sanjay Kumar Madria, Mukesh K. Mohania, Sourav S. ...
119
Voted
ICCV
2009
IEEE
16 years 5 months ago
Beyond Connecting the Dots: A Polynomial-time Algorithm for Segmentation and Boundary Estimation with Imprecise User Input
We propose a polynomial-time algorithm for segmentation and (open) boundary estimation which takes into account a series of user-specified attraction points. In contrast to exis...
Thomas Windheuser, Thomas Schoenemann, Daniel Crem...
101
Voted
SCA
2007
15 years 3 months ago
Adaptive deformations with fast tight bounds
Simulation of deformations and collision detection are two highly intertwined problems that are often treated separately. This is especially true in existing elegant adaptive simu...
Miguel A. Otaduy, Daniel Germann, Stephane Redon, ...