Sciweavers

859 search results - page 117 / 172
» The Changing Face of Cryptography
Sort
View
DAGSTUHL
2006
15 years 1 months ago
Taming Dynamic and Selfish Peers
This paper addresses two important challenges for current P2P systems, namely churn and selfishness. First, we report on a system [19] whose desirable properties (small peer degre...
Stefan Schmid, Fabian Kuhn, Thomas Moscibroda, Rog...
IEICET
2006
79views more  IEICET 2006»
14 years 12 months ago
System LSI: Challenges and Opportunities
End of CMOS scaling has been discussed in many places since the late 90's. Even if the end of CMOS scaling is irrelevant, it is for sure that we are facing a turning point in...
Tadahiro Kuroda
IGARSS
2009
14 years 9 months ago
Developing a New Automated Tool for Detecting and Monitoring Dust and Sand Storms using MODIS and Meteosat SEVIRI-MSG Data
In the last three decades, significant advances have been made in mapping and monitoring environmental changes from Earth Observation satellites across a range of spatial and temp...
Hosni Ghedira, Adnan Al Rais
CVPR
2003
IEEE
16 years 1 months ago
Joint Manifold Distance: a new approach to appearance based clustering
We wish to match sets of images to sets of images where both sets are undergoing various distortions such as viewpoint and lighting changes. To this end we have developed a Joint ...
Andrew W. Fitzgibbon, Andrew Zisserman
ECCV
2008
Springer
16 years 1 months ago
Saliency Based Opportunistic Search for Object Part Extraction and Labeling
We study the task of object part extraction and labeling, which seeks to understand objects beyond simply identifiying their bounding boxes. We start from bottom-up segmentation of...
Yang Wu, Qihui Zhu, Jianbo Shi, Nanning Zheng