Sciweavers

2992 search results - page 576 / 599
» Semantic Distance Measures
Sort
View
SIGMETRICS
2008
ACM
140views Hardware» more  SIGMETRICS 2008»
13 years 9 months ago
Scalable VPN routing via relaying
Enterprise customers are increasingly adopting MPLS (Multiprotocol Label Switching) VPN (Virtual Private Network) service that offers direct any-to-any reachability among the cust...
Changhoon Kim, Alexandre Gerber, Carsten Lund, Dan...
IJNSEC
2007
193views more  IJNSEC 2007»
13 years 9 months ago
Statistical Attack Resilient Data Hiding
In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum base...
Palak K. Amin, Ning Liu, Koduvayur P. Subbalakshmi
TIFS
2008
157views more  TIFS 2008»
13 years 9 months ago
Subspace Approximation of Face Recognition Algorithms: An Empirical Study
We present a theory for constructing linear subspace approximations to face-recognition algorithms and empirically demonstrate that a surprisingly diverse set of face-recognition a...
Pranab Mohanty, Sudeep Sarkar, Rangachar Kasturi, ...
BMCBI
2005
251views more  BMCBI 2005»
13 years 9 months ago
Contextual weighting for Support Vector Machines in literature mining: an application to gene versus protein name disambiguation
Background: The ability to distinguish between genes and proteins is essential for understanding biological text. Support Vector Machines (SVMs) have been proven to be very effici...
Tapio Pahikkala, Filip Ginter, Jorma Boberg, Jouni...
JSAC
2007
127views more  JSAC 2007»
13 years 9 months ago
Routing in Sparse Vehicular Ad Hoc Wireless Networks
— A Vehicular Ad Hoc Network (VANET) may exhibit a bipolar behavior, i.e., the network can either be fully connected or sparsely connected depending on the time of day or on the ...
Nawaporn Wisitpongphan, Fan Bai, Priyantha Mudalig...