Sciweavers

2204 search results - page 374 / 441
» Combining Multiple Clustering Systems
Sort
View
MM
2006
ACM
209views Multimedia» more  MM 2006»
14 years 4 months ago
Automatic detection of player's identity in soccer videos using faces and text cues
In soccer videos, most significant actions are usually followed by close–up shots of players that take part in the action itself. Automatically annotating the identity of the p...
Marco Bertini, Alberto Del Bimbo, Walter Nunziati
SOUPS
2006
ACM
14 years 4 months ago
Passpet: convenient password management and phishing protection
We describe Passpet, a tool that improves both the convenience and security of website logins through a combination of techniques. Password hashing helps users manage multiple acc...
Ka-Ping Yee, Kragen Sitaker
CSB
2005
IEEE
206views Bioinformatics» more  CSB 2005»
14 years 3 months ago
Bioinformatic Insights from Metagenomics through Visualization
Cutting-edge biological and bioinformatics research seeks a systems perspective through the analysis of multiple types of high-throughput and other experimental data for the same ...
Susan L. Havre, Bobbie-Jo M. Webb-Robertson, Anuj ...
QSHINE
2005
IEEE
14 years 3 months ago
Utility-based Adaptive Resource Allocation in Hybrid Wireless Networks
Service availability in wireless networks is highly dependent on efficient resource allocation and guaranteed Quality of Service (QoS) amid overloads and failures. This paper add...
Calin Curescu, Simin Nadjm-Tehrani, Bing Cao, Tere...
CHES
2005
Springer
108views Cryptology» more  CHES 2005»
14 years 3 months ago
Further Hidden Markov Model Cryptanalysis
We extend the model of Karlof and Wagner for modelling side channel attacks via Input Driven Hidden Markov Models (IDHMM) to the case where not every state corresponds to a single ...
P. J. Green, Richard Noad, Nigel P. Smart