Sciweavers

733 search results - page 68 / 147
» An Experimental Evaluation of Rate Adaptation for Multi-Ante...
Sort
View
PR
2010
141views more  PR 2010»
13 years 2 months ago
On the vulnerability of face verification systems to hill-climbing attacks
In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking tech...
Javier Galbally, Chris McCool, Julian Fiérr...
GECCO
2005
Springer
125views Optimization» more  GECCO 2005»
14 years 1 months ago
Evolutionary models for maternal effects in simulated developmental systems
Maternal influence on offspring goes beyond strict nuclear (DNA) inheritance: inherited maternal mRNA, mitochondria, caring and nurturing are all additional sources that affect...
Artur Matos, Reiji Suzuki, Takaya Arita
CSCW
2006
ACM
14 years 1 months ago
FeedMe: a collaborative alert filtering system
As the number of alerts generated by collaborative applications grows, users receive more unwanted alerts. FeedMe is a general alert management system based on XML feed protocols ...
Shilad Sen, Werner Geyer, Michael J. Muller, Marty...
CIVR
2007
Springer
241views Image Analysis» more  CIVR 2007»
14 years 2 months ago
A robust scene recognition system for baseball broadcast using data-driven approach
We propose a robust scene recognition system for baseball broadcast videos. This system is based on the data-driven approach which has been successful in continuous speech recogni...
Ryoichi Ando, Koichi Shinoda, Sadaoki Furui, Takah...
SIGCOMM
2004
ACM
14 years 1 months ago
An algebraic approach to practical and scalable overlay network monitoring
Overlay network monitoring enables distributed Internet applications to detect and recover from path outages and periods of degraded performance within seconds. For an overlay net...
Yan Chen, David Bindel, Han Hee Song, Randy H. Kat...