Sciweavers

143 search results - page 20 / 29
» Low Cost Secure Computation for the General Client-Server Co...
Sort
View
MSWIM
2005
ACM
14 years 8 days ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
CCS
2007
ACM
14 years 27 days ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
ISBI
2011
IEEE
12 years 10 months ago
Automated lineage tree reconstruction from Caenorhabditis elegans image data using particle filtering based cell tracking
Caenorhabditis elegans is an important model organism for the study of molecular mechanisms of development and disease processes, due to its well-known genome and invariant cell l...
Noemí Carranza-Herrezuelo, Ihor Smal, Oleh ...
TIP
2010
255views more  TIP 2010»
13 years 1 months ago
Image Super-Resolution Via Sparse Representation
This paper presents a new approach to single-image superresolution, based on sparse signal representation. Research on image statistics suggests that image patches can be wellrepre...
Jianchao Yang, John Wright, Thomas S. Huang, Yi Ma
OOPSLA
2005
Springer
14 years 6 days ago
Estimating software based on use case points
It is well documented that software product cost estimates are notoriously inaccurate across the software industry. Creating accurate cost estimates for software product developme...
Edward R. Carroll