Sciweavers

10296 search results - page 70 / 2060
» Distribution of Mutual Information
Sort
View
ICPR
2006
IEEE
14 years 11 months ago
Car/Non-Car Classification in an Informative Sample Subspace
In this paper, we present a method for data classification with application to car/non-car objects. We first developed a sample based car/non-car maximal mutual information low di...
Guoping Qiu, Jianzhong Fang
WWW
2008
ACM
14 years 10 months ago
Guanxi in the chinese web - a study of mutual linking
Guanxi is a type of dyadic social interaction based on feelings ("qing") and trust ("xin"). Long studied by scholars of Chinese origin, it has recently drawn t...
Valerie King, Louis Lei Yu, Yan Zhuang
ICISS
2007
Springer
14 years 1 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
CSREASAM
2006
13 years 11 months ago
Data Security and wireless networks: mutually exclusive?
- The increased use and popularity of wireless networks has seen their adoption in medical information systems. They provide the advantages of mobility and instant information avai...
Andrew Woodward
MSS
1999
IEEE
121views Hardware» more  MSS 1999»
14 years 2 months ago
Device Locks: Mutual Exclusion for Storage Area Networks
Device Locks are mechanisms used in distributed environments to facilitate mutual exclusion of shared resources. They can further be used to maintain coherence of data that is cac...
Kenneth W. Preslan, Steven R. Soltis, Christopher ...