Sciweavers

810 search results - page 155 / 162
» Modeling User Runtime Estimates
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Password Strength: An Empirical Analysis
—It is a well known fact that user-chosen passwords are somewhat predictable: by using tools such as dictionaries or probabilistic models, attackers and password recovery tools c...
Matteo Dell'Amico, Pietro Michiardi, Yves Roudier
CORR
2010
Springer
114views Education» more  CORR 2010»
13 years 6 months ago
Efficiently Discovering Hammock Paths from Induced Similarity Networks
ty networks are important abstractions in many information management applications such as recommender systems, corpora analysis, and medical informatics. For instance, in a recom...
M. Shahriar Hossain, Michael Narayan, Naren Ramakr...
PIMRC
2010
IEEE
13 years 5 months ago
Opportunistic channel access scheme for cognitive radio system based on residual white space distribution
We propose an opportunistic channel access scheme for cognitive radio-enabled secondary networks. In our work, we model the channel occupancy due to Primary User (PU) activity as a...
Manuj Sharma, Anirudha Sahoo
TWC
2010
13 years 2 months ago
Managing the interference structure of MIMO HSDPA: a multi-user interference aware MMSE receiver with moderate complexity
It is known that Wideband Code-Division Multiple Access (W-CDMA) networks are limited by interference more than by any other single effect. Due to the frequency selectivity of the ...
Martin Wrulich, Christian Mehlführer, Markus ...
CVPR
2012
IEEE
11 years 10 months ago
KNN matting
We are interested in a general alpha matting approach for the simultaneous extraction of multiple image layers; each layer may have disjoint segments for material matting not limi...
Qifeng Chen, Dingzeyu Li, Chi-Keung Tang