Sciweavers

289 search results - page 34 / 58
» adhoc 2006
Sort
View
EGITALY
2006
14 years 11 months ago
SVG Vectorization by Statistical Region Merging
In this paper a novel algorithm for raster to vector conversion is presented. The technique is mainly devoted to vectorize digital picture maintaining an high degree of photoreali...
Sebastiano Battiato, Giovanni Maria Farinella, Gio...
EUROPLOP
2006
14 years 11 months ago
A Pattern Language for Overlay Networks in Peer-to-Peer Systems
Peer-to-peer systems typically operate in large-scale, highly unreliable and insecure environments. Tackling this complexity requires good software design. Yet, many peer-to-peer ...
Dominik Grolimund, Peter Muller
JEC
2006
88views more  JEC 2006»
14 years 9 months ago
Synchroscalar: Evaluation of an embedded, multi-core architecture for media applications
We present an overview of the Synchroscalar single-chip, multi-core processor. Through the design of Synchroscalar, we find that high energy efficiency and low complexity can be a...
John Oliver, Ravishankar Rao, Diana Franklin, Fred...
51
Voted
IJMC
2007
40views more  IJMC 2007»
14 years 9 months ago
Valuing wireless data services solutions for corporate clients using real options
: The paper deals with wireless data services and their importance in the enterprise world. Provisioning in difficult-to-reach areas of tall buildings is challenging. To extend cov...
William Ramirez, Fotios C. Harmantzis, Venkata Pra...
IAJIT
2010
190views more  IAJIT 2010»
14 years 8 months ago
Framework for intrusion detection in IEEE 802.11 wireless mesh networks
: Intrusion detection system is one of the possible solutions to timely detect the intrusions and alarm for appropriate action. So far many intrusion detection systems have been pr...
Shafiullah Khan, Kok-Keong Loo, Zia Ud Din