Sciweavers

1266 search results - page 175 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
NETGAMES
2004
ACM
15 years 9 months ago
Realizing bullet time effect in multiplayer games with local perception filters
Local perception filters exploit the limitations of human perception to reduce the effects of network latency in multiplayer computer games. Because they allow temporal distorti...
Jouni Smed, Henrik Niinisalo, Harri Hakonen
IH
2004
Springer
15 years 9 months ago
Improved Detection of LSB Steganography in Grayscale Images
We consider methods for answering reliably the question of whether an image contains hidden data; the focus is on grayscale bitmap images and simple LSB steganography. Using a dist...
Andrew D. Ker
MWCN
2004
Springer
15 years 9 months ago
Short-Term Fairness of 802.11 Networks with Several Hosts
Previously, we have analyzed the short-term fairness of the 802.11 DCF (Distributed Coordination Function) access method in the case of a network with two hosts. In this paper we e...
Gilles Berger-Sabbatel, Andrzej Duda, Martin Heuss...
AAAI
1996
15 years 5 months ago
Building Classifiers Using Bayesian Networks
Recent work in supervised learning has shown that a surprisingly simple Bayesian classifier with strong assumptions of independence among features, called naive Bayes, is competit...
Nir Friedman, Moisés Goldszmidt
ICDAR
2009
IEEE
15 years 10 months ago
Graphic Symbol Recognition Using Graph Based Signature and Bayesian Network Classifier
We present a new approach for recognition of complex graphic symbols in technical documents. Graphic symbol recognition is a well known challenge in the field of document image an...
Muhammad Muzzamil Luqman, Thierry Brouard, Jean-Yv...