Sciweavers

1076 search results - page 161 / 216
» Quantifying WiMAX Performance
Sort
View
PAMI
2002
136views more  PAMI 2002»
13 years 8 months ago
On the Individuality of Fingerprints
Fingerprint identification is based on two basic premises: (i) persistence: the basic characteristics of fingerprints do not change with time; and (ii) individuality: the fingerpr...
Sharath Pankanti, Salil Prabhakar, Anil K. Jain
PE
2007
Springer
175views Optimization» more  PE 2007»
13 years 8 months ago
Delay and resource analysis in MANETs in presence of throwboxes
This paper addresses the delay analysis and resource consumption in mobile ad hoc networks (MANETs) equipped with throwboxes. Throwboxes are stationary, wireless devices that act ...
Mouhamad Ibrahim, Ahmad Al Hanbali, Philippe Nain
ML
2010
ACM
124views Machine Learning» more  ML 2010»
13 years 7 months ago
Large scale image annotation: learning to rank with joint word-image embeddings
Image annotation datasets are becoming larger and larger, with tens of millions of images and tens of thousands of possible annotations. We propose a strongly performing method tha...
Jason Weston, Samy Bengio, Nicolas Usunier
P2P
2010
IEEE
189views Communications» more  P2P 2010»
13 years 7 months ago
Analyzing the DC File Sharing Network
—This paper investigates the Direct Connect (DC) file sharing network, which to the best of our knowledge, has never been academically studied before. We developed a participati...
Pavel Gurvich, Noam Koenigstein, Yuval Shavitt
PERCOM
2010
ACM
13 years 7 months ago
An integrated system for secure code distribution in Wireless Sensor Networks
—This paper presents a Secure Code Update (SCU) system for Wireless Sensor Networks (WSNs). This solution achieves different security goals. First, through a dedicated authentica...
Nicola Bui, Osman Ugus, Moreno Dissegna, Michele R...