Sciweavers

349 search results - page 62 / 70
» Computer Security Research: Approaches and Assumptions
Sort
View
CVPR
2009
IEEE
15 years 3 months ago
Implicit Elastic Matching with Random Projections for Pose-variant Face Recognition
We present a new approach to robust pose-variant face recognition, which exhibits excellent generalization ability even across completely different datasets due to its weak depe...
John Wright (University of Illinois), Gang Hua (Mi...
MOBIHOC
2005
ACM
14 years 8 months ago
Interference-aware topology control and QoS routing in multi-channel wireless mesh networks
The throughput of wireless networks can be significantly improved by multi-channel communications compared with single-channel communications since the use of multiple channels ca...
Jian Tang, Guoliang Xue, Weiyi Zhang
EDBT
2009
ACM
113views Database» more  EDBT 2009»
14 years 3 months ago
Type-based categorization of relational attributes
In this work we concentrate on categorization of relational attributes based on their data type. Assuming that attribute type/characteristics are unknown or unidentifiable, we an...
Babak Ahmadi, Marios Hadjieleftheriou, Thomas Seid...
CHI
2003
ACM
14 years 9 months ago
The digital set-top box as a virtual channel provider
This research is based on the realization that the desktop computing paradigm is not appropriate for television, because it is adapted to fundamentally different user aspirations ...
Konstantinos Chorianopoulos
CONEXT
2009
ACM
13 years 9 months ago
Online optimization of 802.11 mesh networks
802.11 wireless mesh networks are ubiquitous, but suffer from severe performance degradations due to poor synergy between the 802.11 CSMA MAC protocol and higher layers. Several s...
Theodoros Salonidis, Georgios Sotiropoulos, Roch G...