Sciweavers

860 search results - page 148 / 172
» An Efficient Technique for Distance Computation in Road Netw...
Sort
View
WWW
2005
ACM
14 years 9 months ago
Enhancing the privacy of web-based communication
A profiling adversary is an adversary whose goal is to classify a population of users into categories according to messages they exchange. This adversary models the most common pr...
Aleksandra Korolova, Ayman Farahat, Philippe Golle
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Analysis of a gossip protocol in PRISM
Gossip protocols have been proposed as a robust and efficient method for disseminating information throughout dynamically changing networks. We present an analysis of a gossip pro...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
VTC
2007
IEEE
14 years 2 months ago
Performance of Single-Carrier Frequency-Domain Adaptive Antenna Array
— The bit error rate (BER) performance of single-carrier (SC) transmission in a frequency-selective fading channel can be significantly improved by using frequency-domain equaliz...
Byeong-Woo Kang, Kazuaki Takeda, Fumiyuki Adachi
ICPR
2006
IEEE
14 years 9 months ago
A New Approach to Automated Retinal Vessel Segmentation Using Multiscale Analysis
Computer based analysis for automated segmentation of blood vessels in retinal images will help eye care specialists screen larger populations for vessel abnormalities. However, a...
Qin Li, Lei Zhang, David Zhang, Prabir Bhattachary...
DSN
2005
IEEE
14 years 2 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...