Sciweavers

1809 search results - page 219 / 362
» Weakly Computable Real Numbers
Sort
View
122
Voted
ICPADS
2006
IEEE
15 years 11 months ago
Coloring the Internet: IP Traceback
Several IP Traceback schemes employing packet marking have been proposed to trace DoS/DDoS attacks that use source address spoofing. The major challenges in the design of an ef...
Muthusrinivasan Muthuprasanna, G. Manimaran, Manso...
ATAL
2005
Springer
15 years 10 months ago
Controlling teams of uninhabited air vehicles
We describe a Multi-Agent System (MAS) for controlling teams of uninhabited air vehicles (UAVs) in the context of a larger system that has been used to evaluate potential concepts...
Jeremy W. Baxter, Graham S. Horn
ICDAR
2003
IEEE
15 years 10 months ago
A Neural-Evolutionary Approach for Feature and Architecture Selection in Online Handwriting Recognition
An automatic recognition of online handwritten text has been an on-going research problem for nearly four decades. It has been gaining more interest due to the increasing populari...
Brijesh Verma, Moumita Ghosh
DSOM
2003
Springer
15 years 10 months ago
A Method on Multimedia Service Traffic Monitoring and Analysis
The use of multimedia service applications is growing rapidly on the Internet. These applications are generating a huge volume of network traffic, which has a great impact on netw...
Hun-Jeong Kang, Myung-Sup Kim, James Won-Ki Hong
223
Voted
BCS
2008
15 years 6 months ago
Improved SIFT-Features Matching for Object Recognition
: The SIFT algorithm (Scale Invariant Feature Transform) proposed by Lowe [1] is an approach for extracting distinctive invariant features from images. It has been successfully app...
Faraj Alhwarin, Chao Wang, Danijela Ristic-Durrant...