Sciweavers

2204 search results - page 385 / 441
» Combining Multiple Clustering Systems
Sort
View
SCAM
2006
IEEE
14 years 3 months ago
Factoring Differences for Iterative Change Management
An approach for factoring source-code differences is presented. A single large difference between two versions of a program is decomposed into factors (i.e., smaller changes). The...
Michael L. Collard, Huzefa H. Kagdi, Jonathan I. M...
SIGCOMM
2006
ACM
14 years 3 months ago
Jigsaw: solving the puzzle of enterprise 802.11 analysis
The combination of unlicensed spectrum, cheap wireless interfaces and the inherent convenience of untethered computing have made 802.11-based networks ubiquitous in the enterprise...
Yu-Chung Cheng, John Bellardo, Péter Benk&o...
AVSS
2005
IEEE
14 years 2 months ago
Rank-based multisensory fusion in multitarget video tracking
An attractive approach to improve tracking performance for visual surveillance is to use information from multiple visual sensory cues such as position, color, shape, etc. Previou...
Damian M. Lyons, D. Frank Hsu
ITCC
2005
IEEE
14 years 2 months ago
A Scalable Dual Mode Arithmetic Unit for Public Key Cryptosystems
Elliptic Curve Cryptosystems (ECC) have become popular in recent years due to their smaller key sizes than traditional public key schemes such as RSA. However the gap between the ...
Francis M. Crowe, Alan Daly, William P. Marnane
IFIP
2005
Springer
14 years 2 months ago
Probable Innocence Revisited
In this paper we propose a formalization of probable innocence, a notion of probabilistic anonymity that is associated to “realistic” protocols such as Crowds. We analyze crit...
Konstantinos Chatzikokolakis, Catuscia Palamidessi