Sciweavers

1094 search results - page 203 / 219
» List signature schemes
Sort
View
ICICS
2003
Springer
14 years 21 days ago
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents
Abstract. For the application of large-scale mobile agents in a distributed environment, where a large number of computers are connected together to enable the large-scale sharing ...
Yan Wang 0002, Chi-Hung Chi, Tieyan Li
CVPR
2010
IEEE
14 years 11 days ago
A Novel Markov Random Field Based Deformable Model for Face Recognition
In this paper, a new scheme to address the face recognition problem is proposed. Different from traditional face recognition approaches which represent each facial image by a sing...
Shu Liao, Albert C.S. Chung
ACSAC
2003
IEEE
13 years 11 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
BMCBI
2007
207views more  BMCBI 2007»
13 years 7 months ago
Discovering biomarkers from gene expression data for predicting cancer subgroups using neural networks and relational fuzzy clus
Background: The four heterogeneous childhood cancers, neuroblastoma, non-Hodgkin lymphoma, rhabdomyosarcoma, and Ewing sarcoma present a similar histology of small round blue cell...
Nikhil R. Pal, Kripamoy Aguan, Animesh Sharma, Shu...
JCP
2006
92views more  JCP 2006»
13 years 7 months ago
A Novel Pulse Echo Correlation Tool for Transmission Path Testing and Fault Diagnosis
Abstract-- In this paper a novel pulse sequence testing methodology is presented [22] as an alternative to Time Domain Reflectometry (TDR) for transmission line health condition mo...
David M. Horan, Richard A. Guinee