Sciweavers

9316 search results - page 1835 / 1864
» Analysis of traceback techniques
Sort
View
CORR
2007
Springer
110views Education» more  CORR 2007»
13 years 7 months ago
Graph Annotations in Modeling Complex Network Topologies
abstract such additional information as network annotations. We introduce a network topology modeling framework that treats annotations as an extended correlation profile of a net...
Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, A...
CORR
2007
Springer
124views Education» more  CORR 2007»
13 years 7 months ago
Anonymous Networking amidst Eavesdroppers
—The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of “anonymity” of routes in eave...
Parvathinathan Venkitasubramaniam, Ting He, Lang T...
ISCI
2006
145views more  ISCI 2006»
13 years 7 months ago
Processing count queries over event streams at multiple time granularities
Management and analysis of streaming data has become crucial with its applications in web, sensor data, network traffic data, and stock market. Data streams consist of mostly nume...
Aykut Ünal, Yücel Saygin, Özgü...
IVC
2006
187views more  IVC 2006»
13 years 7 months ago
Dynamics of facial expression extracted automatically from video
We present a systematic comparison of machine learning methods applied to the problem of fully automatic recognition of facial expressions, including AdaBoost, support vector mach...
Gwen Littlewort, Marian Stewart Bartlett, Ian R. F...
CVIU
2007
128views more  CVIU 2007»
13 years 7 months ago
Iterative relative fuzzy connectedness for multiple objects with multiple seeds
In this paper we present a new theory and an algorithm for image segmentation based on a strength of connectedness between every pair of image elements. The object definition use...
Krzysztof Ciesielski, Jayaram K. Udupa, Punam K. S...
« Prev « First page 1835 / 1864 Last » Next »