Sciweavers

1329 search results - page 150 / 266
» Phantom faces for face analysis
Sort
View
COOPIS
2003
IEEE
14 years 2 months ago
Automatic Expansion of Manual Email Classifications Based on Text Analysis
The organization of documents is a task that we face as computer users daily. This is particularly true for management of email. Typically email documents are organized in director...
Enrico Giacoletto, Karl Aberer
ICPPW
2003
IEEE
14 years 2 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
NDSS
2002
IEEE
14 years 2 months ago
An Analysis of the Degradation of Anonymous Protocols
There have been a number of protocols proposed for anonymous network communication. In this paper we investigate attacks by corrupt group members that degrade the anonymity of eac...
Matthew Wright, Micah Adler, Brian Neil Levine, Cl...
ISCA
1998
IEEE
142views Hardware» more  ISCA 1998»
14 years 1 months ago
An Analysis of Correlation and Predictability: What Makes Two-Level Branch Predictors Work
Pipeline flushes due to branch mispredictions is one of the most serious problems facing the designer of a deeply pipelined, superscalar processor. Many branch predictors have bee...
Marius Evers, Sanjay J. Patel, Robert S. Chappell,...
ANTSW
2006
Springer
14 years 1 months ago
An Analysis of the Different Components of the AntHocNet Routing Algorithm
Abstract. Mobile ad hoc networks are a class of highly dynamic networks. In previous work, we developed a new routing algorithm, called AntHocNet, for these challenging network env...
Frederick Ducatelle, Gianni Di Caro, Luca Maria Ga...