Sciweavers

25175 search results - page 4992 / 5035
» MPEG-4 systems and applications
Sort
View
JSAC
2006
156views more  JSAC 2006»
13 years 8 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
ML
2008
ACM
248views Machine Learning» more  ML 2008»
13 years 8 months ago
Feature selection via sensitivity analysis of SVM probabilistic outputs
Feature selection is an important aspect of solving data-mining and machine-learning problems. This paper proposes a feature-selection method for the Support Vector Machine (SVM) l...
Kai Quan Shen, Chong Jin Ong, Xiao Ping Li, Einar ...
JVCIR
2006
163views more  JVCIR 2006»
13 years 8 months ago
Layered H.264 video transmission with hierarchical QAM
In multimedia communication systems, channel bandwidth and probability of error are the two main limitations that affect the quality of service. Therefore, in applications such as...
Mohammad Mahdi Ghandi, Mohammed Ghanbari
NETWORK
2008
139views more  NETWORK 2008»
13 years 8 months ago
Composing semantic services in open sensor-rich environments
Consider a scenario where Jane is at an airport. She wants to find a restaurant with healthy food and short waiting time on the way to her terminal. The airport can provide such s...
Jie Liu, Feng Zhao
FGCS
2007
146views more  FGCS 2007»
13 years 8 months ago
Distributed medical images analysis on a Grid infrastructure
In this paper medical applications on a Grid infrastructure, the MAGIC-5 Project, are presented and discussed. MAGIC-5 aims at developing Computer Aided Detection (CADe) software ...
Roberto Bellotti, Piergiorgio Cerello, S. Tangaro,...
« Prev « First page 4992 / 5035 Last » Next »