Sciweavers

1929 search results - page 221 / 386
» An Approach to Limit the Wynot Problem
Sort
View
LPNMR
2009
Springer
14 years 1 months ago
HAPLO-ASP: Haplotype Inference Using Answer Set Programming
Identifying maternal and paternal inheritance is essential to be able to find the set of genes responsible for a particular disease. However, due to technological limitations, we ...
Esra Erdem, Ozan Erdem, Ferhan Türe
ICC
2007
IEEE
14 years 3 months ago
Preventing ARP Attacks Using a Fuzzy-Based Stateful ARP Cache
— ARP cache poisoning is considered to be one of the easiest and dangerous attacks in local area networks. This paper proposes a solution to the ARP poisoning problem by extendin...
Zouheir Trabelsi, Wasim El-Hajj
XMLSEC
2003
ACM
14 years 2 months ago
Optimistic fair contract signing for Web services
Reliable and atomic transactions are a key to successful eBusiness interactions. Reliable messaging subsystems, such as IBM’s MQ Series, or broker-based techniques have been tra...
Hiroshi Maruyama, Taiga Nakamura, Tony Hsieh
INFOCOM
2002
IEEE
14 years 2 months ago
Optimal Energy Allocation and Admission Control for Communications Satellites
—We address the issue of optimal energy allocation and admission control for communications satellites in earth orbit. Such satellites receive requests for transmission as they o...
Alvin Fu, Eytan Modiano, John N. Tsitsiklis
AMFG
2007
IEEE
238views Biometrics» more  AMFG 2007»
14 years 1 months ago
Towards Pose-Invariant 2D Face Classification for Surveillance
A key problem for "face in the crowd" recognition from existing surveillance cameras in public spaces (such as mass transit centres) is the issue of pose mismatches betwe...
Conrad Sanderson, Ting Shan, Brian C. Lovell