Sciweavers

773 search results - page 128 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
SIGMETRICS
1998
ACM
13 years 9 months ago
Internet service performance failure detection
The increasing complexity of computer networks and our increasing dependence on them means enforcing reliability requirements is both more challenging and more critical. The expan...
Amy R. Ward, Peter W. Glynn, Kathy J. Richardson
TMM
2002
104views more  TMM 2002»
13 years 9 months ago
Spatial contextual classification and prediction models for mining geospatial data
Modeling spatial context (e.g., autocorrelation) is a key challenge in classification problems that arise in geospatial domains. Markov random fields (MRF) is a popular model for i...
Shashi Shekhar, Paul R. Schrater, Ranga Raju Vatsa...
PRL
2007
180views more  PRL 2007»
13 years 9 months ago
Symmetric hash functions for secure fingerprint biometric systems
Securing biometrics databases from being compromised is one of the most important challenges that must be overcome in order to demonstrate the viability of biometrics based authen...
Sergey Tulyakov, Faisal Farooq, Praveer Mansukhani...
TWC
2008
142views more  TWC 2008»
13 years 9 months ago
Robust Ultra-Wideband Signal Acquisition
Ultra-wideband (UWB) communication is envisaged to be deployed in indoor environments, where the noise distribution is decidedly non-Gaussian. A critical challenge for impulse radi...
Ersen Ekrem, Mutlu Koca, Hakan Deliç
ALIFE
2010
13 years 8 months ago
Modeling Social Learning of Language and Skills
We present a model of social learning of both language and skills, while assuming—insofar as possible—strict autonomy, virtual embodiment, and situatedness. This model is built...
Paul Vogt, Evert Haasdijk