Sciweavers

1818 search results - page 252 / 364
» Operant conditioning
Sort
View
111
Voted
ICNS
2009
IEEE
15 years 9 months ago
Counter-Flooding: DoS Protection for Public Key Handshakes in LANs
—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
Yves Igor Jerschow, Björn Scheuermann, Martin...
INFOCOM
2009
IEEE
15 years 9 months ago
Routing Metric Designs for Greedy, Face and Combined-Greedy-Face Routing
Abstract—Different geographic routing protocols have different requirements on routing metric designs to ensure proper operation. Combining a wrong type of routing metric with a ...
Yujun Li, Yaling Yang, Xianliang Lu
124
Voted
ICB
2009
Springer
251views Biometrics» more  ICB 2009»
15 years 9 months ago
Heterogeneous Face Recognition from Local Structures of Normalized Appearance
Abstract. Heterogeneous face images come from different lighting conditions or different imaging devices, such as visible light (VIS) and near infrared (NIR) based. Because heter...
ShengCai Liao, Dong Yi, Zhen Lei, Rui Qin, Stan Z....
108
Voted
NOSSDAV
2009
Springer
15 years 9 months ago
Adaptive overlay topology for mesh-based P2P-TV systems
In this paper, we propose a simple and fully distributed mechanism for constructing and maintaining the overlay topology in mesh-based P2P-TV systems. Our algorithm optimizes the ...
Richard John Lobb, Ana Paula Couto da Silva, Emili...
NOSSDAV
2009
Springer
15 years 9 months ago
End-to-end secure delivery of scalable video streams
We investigate the problem of securing the delivery of scalable video streams so that receivers can ensure the authenticity (originality and integrity) of the video. Our focus is ...
Kianoosh Mokhtarian, Mohamed Hefeeda