Sciweavers

516 search results - page 65 / 104
» Comparing Two Information Flow Security Properties
Sort
View
COLING
1996
13 years 10 months ago
Good Bigrams
A desired property of a measure of connective strength in bigrams is that the measure should be insensitive to corpus size. This paper investigates the stability of three differen...
Christer Johansson
ICCV
1999
IEEE
14 years 10 months ago
Projective Alignment with Regions
?We have recently proposed an approach to recognition that uses regions to determine the pose of objects while allowing for partial occlusion of the regions. Regions introduce an a...
Ronen Basri, David W. Jacobs
ICNP
1998
IEEE
14 years 1 months ago
A Class of End-to-End Congestion Control Algorithms for the Internet
We formulate end-to-end congestion control as a global optimization problem. Based on this formulation, a class of minimum cost flow control (MCFC) algorithms for adjusting sessio...
S. Jamaloddin Golestani, S. Bhattacharyya
INFOCOM
2008
IEEE
14 years 3 months ago
Towards Statistically Strong Source Anonymity for Sensor Networks
—For sensor networks deployed to monitor and report real events, event source anonymity is an attractive and critical security property, which unfortunately is also very difficu...
Min Shao, Yi Yang, Sencun Zhu, Guohong Cao
IJCNN
2006
IEEE
14 years 2 months ago
Correntropy: A Localized Similarity Measure
—The measure of similarity normally utilized in statistical signal processing is based on second order moments. In this paper, we reveal the probabilistic meaning of correntropy ...
Weifeng Liu, Puskal P. Pokharel, Jose C. Principe