Sciweavers

10458 search results - page 1785 / 2092
» Modeling Features at Runtime
Sort
View
158
Voted
TMC
2012
13 years 5 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
17 years 2 months ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li

Source Code
1511views
17 years 1 months ago
VXL - The Vision-something-Libraries
VXL is a collection of C++ libraries designed for computer vision research and implementation. VXL is written in ANSI/ISO C++ and is designed to be portable over many platforms. Th...

Publication
314views
17 years 29 days ago
LED: Load Early Detection: A Congestion Control Algorithm based on Router Traffic Load
Efficient bandwidth allocation and low delays remain important goals, expecially in high-speed networks. Existing end-to-end congestion control schemes (such as TCP+AQM/RED) have s...
A. Durresi, P. Kandikuppa, M. Sridharan, S. Chella...
CVPR
2009
IEEE
16 years 9 months ago
Contextual Flow
Matching based on local brightness is quite limited, because small changes on local appearance invalidate the constancy in brightness. The root of this limitation is its treatme...
Ying Wu (Northwestern University), Jialue Fan (Nor...
« Prev « First page 1785 / 2092 Last » Next »