Sciweavers

3238 search results - page 449 / 648
» Not Enough Points Is Enough
Sort
View
JCIT
2008
78views more  JCIT 2008»
13 years 10 months ago
A Study on Web Caching based on Reference Characteristics of Web Objects
There are various web caching replacement algorithms related to reference characteristics of web objects were researched. They could be used in regard to user characteristics of c...
Yun Ji Na, Sarvar R. Abdullaev, Il Seok Ko
JCIT
2008
117views more  JCIT 2008»
13 years 10 months ago
The New Face Recognition Technique With the use of PCA and LDA
Image recognition using various image classifiers is an active research area. In this paper we will describe a new face recognition method based on PCA (Principal Component Analys...
Seyed Zeinolabedin Moussavi, Saeedreza Ehteram, Al...
JCM
2008
77views more  JCM 2008»
13 years 10 months ago
In-Field Attack Proof of Injected False Data in Sensor Networks
In a large-scale sensor network individual sensors can be compromised to inject bogus sensing reports. While SEF can filter out the outfield false reports, it is incapable of detec...
Zheng Wang, Xiaodong Lee, Xinchang Zhang, Baoping ...
CORR
2007
Springer
176views Education» more  CORR 2007»
13 years 10 months ago
Crystallization in large wireless networks
—We analyze fading interference relay networks where M single-antenna source-destination terminal pairs communicate concurrently and in the same frequency band through a set of K...
Veniamin I. Morgenshtern, Helmut Bölcskei
INFSOF
2006
72views more  INFSOF 2006»
13 years 10 months ago
Partial rollback in object-oriented/object-relational database management systems with dual buffer
Partial rollback mechanism has been widely supported by many database management systems (DBMSs). It allows a transaction to be rolled back partially, that is, only back to a cert...
Won-Young Kim, Byung Suk Lee, Kyu-Young Whang