Sciweavers

673 search results - page 106 / 135
» Biometric random number generators
Sort
View
IH
2005
Springer
14 years 1 months ago
Embedding Covert Channels into TCP/IP
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
Steven J. Murdoch, Stephen Lewis
WEBI
2005
Springer
14 years 1 months ago
WICER: A Weighted Inter-Cluster Edge Ranking for Clustered Graphs
Several algorithms based on link analysis have been developed to measure the importance of nodes on a graph such as pages on the World Wide Web. PageRank and HITS are the most pop...
Divya Padmanabhan, Prasanna Kumar Desikan, Jaideep...
WEBI
2004
Springer
14 years 1 months ago
Type-Based Composition of Information Services in Large Scale Environments
Service matchmaking and composition has recently drawn increasing attention in the research community. Most existing algorithms construct chains of services based on exact matches...
Ion Constantinescu, Boi Faltings, Walter Binder
GECCO
2003
Springer
128views Optimization» more  GECCO 2003»
14 years 28 days ago
The Principle of Maximum Entropy-Based Two-Phase Optimization of Fuzzy Controller by Evolutionary Programming
In this paper, a two-phase evolutionary optimization scheme is proposed for obtaining optimal structure of fuzzy control rules and their associated weights, using evolutionary prog...
Chi-Ho Lee, Ming Yuchi, Hyun Myung, Jong-Hwan Kim
ICCVW
1999
Springer
13 years 12 months ago
A General Method for Feature Matching and Model Extraction
Abstract. Popular algorithms for feature matching and model extraction fall into two broad categories, generate-and-test and Hough transform variations. However, both methods su er...
Clark F. Olson