Sciweavers

1316 search results - page 42 / 264
» A Computational Approach to Compare Information Revelation P...
Sort
View
TRUST
2009
Springer
14 years 3 months ago
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...
ICPR
2010
IEEE
13 years 9 months ago
A Discrete Labelling Approach to Attributed Graph Matching Using SIFT Features
Local invariant feature extraction methods are widely used for image-features matching. There exist a number of approaches aimed at the refinement of the matches between image-fe...
Gerard Sanromà, René Alquézar...
NIPS
2008
13 years 10 months ago
Spike Feature Extraction Using Informative Samples
This paper presents a new spike feature extraction algorithm that targets real-time spike sorting and facilitates miniaturized microchip implementation. The proposed algorithm has...
Zhi Yang, Qi Zhao, Wentai Liu
ICPR
2006
IEEE
14 years 3 months ago
Visible Edges Thresholding: a HVS based Approach
This paper presents a technique, which determines whether an edge is visible for a human eye or not. First, a threshold function is built according to the optical characteristics ...
Nicolas Hautière, Didier Aubert
GLOBECOM
2008
IEEE
14 years 3 months ago
Rate Adaptation Using Acknowledgement Feedback: Throughput Upper Bounds
—We consider packet-by-packet rate adaptation to maximize the throughput over a finite-state Markov channel. To limit the amount of feedback data, we use past packet acknowledge...
Chin Keong Ho, Job Oostveen, Jean-Paul M. G. Linna...