Sciweavers

7811 search results - page 1218 / 1563
» computing 2004
Sort
View
RAID
2004
Springer
15 years 10 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
WAPCV
2004
Springer
15 years 10 months ago
A Visual Attention-Based Approach for Automatic Landmark Selection and Recognition
Visual attention refers to the ability of a vision system to rapidly detect visually salient locations in a given scene. On the other hand, the selection of robust visual landmarks...
Nabil Ouerhani, Heinz Hügli, Gabriel Gruener,...
CGF
2004
74views more  CGF 2004»
15 years 4 months ago
VOTS: VOlume doTS as a Point-Based Representation of Volumetric Data
We present Volume dots (Vots), a new primitive for volumetric data modelling, processing, and rendering. Vots are a point-based representation of volumetric data. An individual Vo...
Sören Grimm, Stefan Bruckner, Armin Kanitsar,...
WMASH
2004
ACM
15 years 10 months ago
LOCATOR: location estimation system For wireless LANs
With the wide spread growth of mobile computing devices and local area wireless networks, wireless network providers have started to target the users with value-added services bas...
Ankur Agiwal, Parakram Khandpur, Huzur Saran
WS
2004
ACM
15 years 10 months ago
A framework for wireless LAN monitoring and its applications
Many studies on measurement and characterization of wireless LANs (WLANs) have been performed recently. Most of these measurements have been conducted from the wired portion of th...
Jihwang Yeo, Moustafa Youssef, Ashok K. Agrawala
« Prev « First page 1218 / 1563 Last » Next »