Sciweavers

2340 search results - page 414 / 468
» Data abstraction and information hiding
Sort
View
CORR
2011
Springer
193views Education» more  CORR 2011»
12 years 11 months ago
How Unique and Traceable are Usernames?
Abstract. Usernames are ubiquitously used for identification and authentication purposes on web services and the Internet at large, ranging from the local-part of email addresses ...
Daniele Perito, Claude Castelluccia, Mohamed Ali K...
ICASSP
2011
IEEE
12 years 11 months ago
Cooperative sensing in cognitive networks under malicious attack
Abstract—This paper considers cooperative sensing in cognitive networks under Spectrum Sensing Data Falsification attack (SSDF) in which malicious users can intentionally send f...
Mai Abdelhakim, Lei Zhang, Jian Ren, Tongtong Li
INFOCOM
2011
IEEE
12 years 11 months ago
Content management in a mobile ad hoc network: Beyond opportunistic strategy
Abstract—We study the challenging problem of strategic content placement in a dynamic MANET. Existing content placement techniques cannot cope with such network dynamics since th...
Suk-Bok Lee, Starsky H. Y. Wong, Kang-Won Lee, Son...
IWINAC
2011
Springer
12 years 10 months ago
Clustering of Trajectories in Video Surveillance Using Growing Neural Gas
Abstract. One of the more important issues in intelligent video surveillance systems is the ability to handle events from the motion of objects. Thus, the classification of the tr...
Javier Acevedo-Rodríguez, Saturnino Maldona...
ECCV
2002
Springer
14 years 9 months ago
Phase-Based Local Features
Abstract. We introduce a new type of local feature basedon the phaseand amplitude responsesof complex-valuedsteerable filters. The designof this local feature is motivated by a des...
Gustavo Carneiro, Allan D. Jepson