Sciweavers

957 search results - page 106 / 192
» Addition Chain Heuristics
Sort
View
AMFG
2005
IEEE
327views Biometrics» more  AMFG 2005»
14 years 3 months ago
AdaBoost Gabor Fisher Classifier for Face Recognition
This paper proposes the AdaBoost Gabor Fisher Classifier (AGFC) for robust face recognition, in which a chain AdaBoost learning method based on Bootstrap re-sampling is proposed an...
Shiguang Shan, Peng Yang, Xilin Chen, Wen Gao
DEXAW
2005
IEEE
96views Database» more  DEXAW 2005»
14 years 3 months ago
Multiplication over Time to Facilitate Peer-to-Peer Barter Relationships
A peer-to-peer complementary currency can be a powerful tool for promoting exchanges that make use of underutilized computing resources in a trusted way. i-WAT[11] is a proposed s...
Kenji Saito, Eiichi Morino, Jun Murai
ICDCSW
2005
IEEE
14 years 3 months ago
Defending against Sybil Attacks in Sensor Networks
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certifi...
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng N...
IPPS
2005
IEEE
14 years 3 months ago
A Robust Interference Model for Wireless Ad-Hoc Networks
Among the foremost goals of topology control in wireless ad-hoc networks is interference reduction. This paper presents a receiver-centric interference model featuring two main ad...
Pascal von Rickenbach, Stefan Schmid, Roger Watten...
IPOM
2005
Springer
14 years 3 months ago
Discovering Topologies at Router Level
—Measurement and monitoring of network topologies are essential tasks in current network scenarios. Indeed, due to their utility in planning, management, security, and reliabilit...
Donato Emma, Antonio Pescapè, Giorgio Ventr...