Sciweavers

1610 search results - page 263 / 322
» Identity Based Multisignatures
Sort
View
AAAI
2008
14 years 5 days ago
Constrained Classification on Structured Data
Most standard learning algorithms, such as Logistic Regression (LR) and the Support Vector Machine (SVM), are designed to deal with i.i.d. (independent and identically distributed...
Chi-Hoon Lee, Matthew R. G. Brown, Russell Greiner...
ICIA
2007
14 years 5 days ago
Eye Gaze for Attention Prediction in Multimodal Human-Machine Conversation
In a conversational system, determining a user’s focus of attention is crucial to the success of the system. Motivated by previous psycholinguistic findings, we are currently e...
Zahar Prasov, Joyce Yue Chai, Hogyeong Jeong
ACMSE
2008
ACM
13 years 12 months ago
Biometrics education with hands-on labs
Biometrics is an emerging field via the automated use of unique and measurable physiological or behavioral characteristics to determine or verify identity. Biometrics has a variet...
Li Yang, Kathy Winters, Joseph M. Kizza
ATAL
2008
Springer
13 years 12 months ago
Multi-agent approach to network intrusion detection
Our demo presents an agent-based intrusion detection system designed for deployment on high-speed backbone networks. The major contribution of the system is the integration of sev...
Martin Rehák, Michal Pechoucek, Pavel Celed...
ICDCS
2010
IEEE
13 years 12 months ago
Using Analog Network Coding to Improve the RFID Reading Throughput
Abstract—RFID promises to revolutionize the inventory management in large warehouses, retail stores, hospitals, transportation systems, etc. Periodically reading the IDs of the t...
Ming Zhang, Tao Li, Shigang Chen, Bo Li