Sciweavers

5344 search results - page 1059 / 1069
» Privacy-Preserving Set Operations
Sort
View
GI
2009
Springer
13 years 7 months ago
Source Conflicts in Bayesian Identification
: In Bayesian identification an ID source is in conflict with the other ID sources, if both provide substantially different, reliable information on a tracked object. After discuss...
Max Krüger, David Hirschhäuser
HCI
2009
13 years 7 months ago
Mind-Mirror: EEG-Guided Image Evolution
Abstract. We propose a brain-computer interface (BCI) system for evolving images in realtime based on subject feedback derived from electroencephalography (EEG). The goal of this s...
Nima Bigdely Shamlo, Scott Makeig
ICC
2009
IEEE
152views Communications» more  ICC 2009»
13 years 7 months ago
System Spectral Efficiency and Stability of 3G Networks: A Comparative Study
CDMA2000, WCDMA and WiMAX are three widely used 3G technologies. Since they share the same goal, which is to provide broader coverage and higher throughput in 3G networks, an impar...
Yuehong Gao, Xin Zhang, Yuming Jiang, Jeong-woo Ch...
ACSAC
2010
IEEE
13 years 7 months ago
Detecting spammers on social networks
Social networking has become a popular way for users to meet and interact online. Users spend a significant amount of time on popular social network platforms (such as Facebook, M...
Gianluca Stringhini, Christopher Kruegel, Giovanni...
CN
2010
130views more  CN 2010»
13 years 7 months ago
CoreCast: How core/edge separation can help improving inter-domain live streaming
The rapid growth of broadband access has popularized multimedia services, which nowadays contribute to a large part of Internet traffic. Among this content, the broadcasting of li...
Loránd Jakab, Albert Cabellos-Aparicio, Tho...
« Prev « First page 1059 / 1069 Last » Next »