Sciweavers

1257 search results - page 76 / 252
» Performance of Biometric Quality Measures
Sort
View
ISW
2007
Springer
14 years 4 months ago
Queue Management as a DoS Counter-Measure?
In this paper, we study the performance of timeout-based queue management practices in the context of flood denial-of-service (DoS) attacks on connection-oriented protocols, where...
Daniel Boteanu, José M. Fernandez, John McH...
TMC
2010
137views more  TMC 2010»
13 years 9 months ago
Asymptotic Distortion Performance of Source-Channel Diversity over Multihop and Relay Channels
—A key challenge in the design of real-time wireless multimedia systems is the presence of fading coupled with strict delay constraints. A very effective answer to this problem i...
Karim G. Seddik, Andres Kwasinski, K. J. Ray Liu
UMUAI
1998
128views more  UMUAI 1998»
13 years 10 months ago
Using Decision Trees for Agent Modeling: Improving Prediction Performance
A modeling system may be required to predict an agent’s future actions under constraints of inadequate or contradictory relevant historical evidence. This can result in low predi...
Bark Cheung Chiu, Geoffrey I. Webb
HICSS
2005
IEEE
158views Biometrics» more  HICSS 2005»
14 years 4 months ago
Social Networks in Peer-to-Peer Systems
The Gnutella protocol requires peers to broadcast messages to their neighbours when they search files. The message passing generates a lot of traffic in the network, which degrade...
Yamini Upadrashta, Julita Vassileva, Winfried K. G...
DEXA
2007
Springer
140views Database» more  DEXA 2007»
14 years 4 months ago
Clustering-Based K-Anonymisation Algorithms
Abstract. K-anonymisation is an approach to protecting private information contained within a dataset. Many k-anonymisation methods have been proposed recently and one class of suc...
Grigorios Loukides, Jianhua Shao