Sciweavers

277 search results - page 36 / 56
» Using the feasible set method for rezoning in ALE
Sort
View
TELETRAFFIC
2007
Springer
15 years 3 months ago
A Delay Based Multipath Optimal Route Analysis for Multi-hop CSMA/CA Wireless Mesh Networks
In this paper we present a method for determining optimal routes along selected paths in a wireless mesh network based on an interference aware delay analysis. We develop an analyt...
Jiazhen Zhou, Kenneth Mitchell
WACV
2005
IEEE
15 years 3 months ago
Shared Features for Scalable Appearance-Based Object Recognition
We present a framework for learning object representations for fast recognition of a large number of different objects. Rather than learning and storing feature representations s...
Erik Murphy-Chutorian, Jochen Triesch
FPL
2000
Springer
96views Hardware» more  FPL 2000»
15 years 1 months ago
Generation of Design Suggestions for Coarse-Grain Reconfigurable Architectures
Coarse-grain reconfigurable architectures have been a matter of intense research in the last few years. They promise to be more adequate for computational tasks due to their better...
Reiner W. Hartenstein, Michael Herz, Thomas Hoffma...
DAS
2008
Springer
14 years 11 months ago
Affine Invariant Recognition of Characters by Progressive Pruning
There are many problems to realize camera-based character recognition. One of the problems is that characters in scenes are often distorted by geometric transformations such as af...
Akira Horimatsu, Ryo Niwa, Masakazu Iwamura, Koich...
INFOSCALE
2007
ACM
14 years 11 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü