Sciweavers

7587 search results - page 1376 / 1518
» Network Analysis and Visualisation
Sort
View
ICDCS
2010
IEEE
13 years 10 months ago
ASAP: Scalable Identification and Counting for Contactless RFID Systems
The growing importance of operations such as identification, location sensing and object tracking has led to increasing interests in contactless Radio Frequency Identification (RFI...
Chen Qian, Yunhuai Liu, Hoilun Ngan, Lionel M. Ni
APSEC
2007
IEEE
13 years 9 months ago
An Approach to Probabilistic Effort Estimation for Military Avionics Software Maintenance by Considering Structural Characterist
The needs of software maintenance and the importance of maintenance project management increase rapidly in the military avionics industry. Although few previous studies related to...
Tae-Hoon Song, Kyung-A Yoon, Doo-Hwan Bae
CIBCB
2007
IEEE
13 years 9 months ago
Optimization of Bacterial Strains with Variable-Sized Evolutionary Algorithms
—In metabolic engineering it is difficult to identify which set of genetic manipulations will result in a microbial strain that achieves a desired production goal, due to the co...
Miguel Rocha, José P. Pinto, Isabel Rocha, ...
CVPR
2008
IEEE
13 years 9 months ago
Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model
Most digital still color cameras use a single electronic sensor (CCD or CMOS) overlaid with a color filter array. At each pixel location only one color sample is taken, and the ot...
Yizhen Huang, Yangjing Long
FC
2008
Springer
82views Cryptology» more  FC 2008»
13 years 9 months ago
Quantifying Resistance to the Sybil Attack
Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applicat...
N. Boris Margolin, Brian Neil Levine
« Prev « First page 1376 / 1518 Last » Next »