Sciweavers

393 search results - page 64 / 79
» The LCA Problem Revisited
Sort
View
ASE
2005
96views more  ASE 2005»
15 years 1 months ago
A Termination Detection Protocol for Use in Mobile Ad Hoc Networks
As devices become smaller and wireless networking technologies improve, the popularity of mobile computing continues to rise. In today's world, many consider devices such as c...
Gruia-Catalin Roman, Jamie Payton
164
Voted
CVPR
2011
IEEE
14 years 7 months ago
A Two-Stage Reconstruction Approach for Seeing Through Water
Several attempts have been lately proposed to tackle the problem of recovering the original image of an underwater scene using a sequence distorted by water waves. The main draw...
Omar Oreifej, Guang Shu, Teresa Pace, and Mubarak ...
138
Voted
ICCV
2011
IEEE
14 years 1 months ago
From Contours to 3D Object Detection and Pose Estimation
This paper addresses view-invariant object detection and pose estimation from a single image. While recent work focuses on object-centered representations of point-based object fe...
Nadia Payet, Sinisa Todorovic
CCS
2009
ACM
16 years 2 months ago
Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary
In this paper, we re-visit the problem of unconditionally secure message transmission (USMT) from a sender S to a receiver R, who are part of a distributed synchronous network, mo...
Kannan Srinathan, Arpita Patra, Ashish Choudhary, ...
VLDB
2003
ACM
123views Database» more  VLDB 2003»
16 years 2 months ago
A case for fractured mirrors
The Decomposition Storage Model (DSM) vertically partitions all attributes of a given relation. DSM has excellent I/O behavior when the number of attributes touched in the query i...
Ravishankar Ramamurthy, David J. DeWitt, Qi Su