Sciweavers

796 search results - page 122 / 160
» Spoofing prevention method
Sort
View
ENGL
2007
107views more  ENGL 2007»
13 years 9 months ago
Pixel Fusion Based Curvelets and Wavelets Denoise Algorithm
—Curvelets denoise approach has been widely used in many fields for its ability to obtain high quality result images. However artifacts those appear in the result images of curve...
Liyong Ma, Jiachen Ma, Yi Shen
PE
2008
Springer
143views Optimization» more  PE 2008»
13 years 9 months ago
Improving the performance of large interconnection networks using congestion-control mechanisms
As the size of parallel computers increases, as well as the number of sources per router node, congestion inside the interconnection network rises significantly. In such systems, ...
José Miguel-Alonso, Cruz Izu, José-&...
TKDE
2008
115views more  TKDE 2008»
13 years 9 months ago
A Niching Memetic Algorithm for Simultaneous Clustering and Feature Selection
Clustering is inherently a difficult task and is made even more difficult when the selection of relevant features is also an issue. In this paper, we propose an approach for simult...
Weiguo Sheng, Xiaohui Liu, Michael C. Fairhurst
COMCOM
2000
125views more  COMCOM 2000»
13 years 9 months ago
On object initialization in the Java bytecode
Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs ...
Stephane Doyon, Mourad Debbabi
IWC
2000
81views more  IWC 2000»
13 years 9 months ago
Steps to take before intelligent user interfaces become real
Intelligent user interfaces have been proposed as a means to overcome some of the problems that directmanipulation interfaces cannot handle, such as: information overflow problems...
Kristina Höök