Sciweavers

186 search results - page 11 / 38
» Long range mutual information
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 11 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
JASIS
2008
123views more  JASIS 2008»
13 years 7 months ago
Democratic theory in library information science
: A recent article by Joseph Buschman regrets that democratic theory is an unfinished idea. The argument appears to assume an essential relationship between library information sci...
Michael K. Buckland
ECIR
2008
Springer
13 years 9 months ago
Workshop on Novel Methodologies for Evaluation in Information Retrieval
Information retrieval is an empirical science; the field cannot move forward unless there are means of evaluating the innovations devised by researchers. However the methodologies...
Mark Sanderson, Martin Braschler, Nicola Ferro, Ju...
AVSS
2006
IEEE
14 years 1 months ago
Registration of Multimodal Stereo Images Using Disparity Voting from Correspondence Windows
This paper presents a method for registering multimodal imagery in short range surveillance situations when the differences in object depths preclude any global registration techn...
Stephen J. Krotosky, Mohan M. Trivedi
BROADNETS
2005
IEEE
14 years 1 months ago
Using location information for scheduling in 802.15.3 MAC
— In recent years, UWB has received much attention as a suitable Physical Layer (PHY) for Wireless Personal Area Networks (WPANS). UWB allows for low cost, low power, high bandwi...
Sethuram Balaji Kodeswaran, Anupam Joshi