Sciweavers

1018 search results - page 164 / 204
» A Comparative Evaluation of Length Estimators
Sort
View
MDAI
2005
Springer
15 years 3 months ago
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing
Cryptography is the ancient science of encrypting messages so that only the sender and receiver can recover them. To achieve this goal, an agreed key between the sender and receive...
Takeshi Okamoto, Raylin Tso, Eiji Okamoto
EURONGI
2004
Springer
15 years 3 months ago
Admission Region of Multimedia Services for EDCA in IEEE 802.11e Access Networks
This paper presents a simulation analysis for the evaluation of the admission region of a IEEE 802.11e network adopting the EDCA (Enhanced Distributed Channel Access) mechanism. In...
Rosario Giuseppe Garroppo, Stefano Giordano, Stefa...
ECCV
2010
Springer
15 years 3 months ago
Real-time Spatiotemporal Stereo Matching Using the Dual-Cross-Bilateral Grid
We introduce a real-time stereo matching technique based on a reformulation of Yoon and Kweon’s adaptive support weights algorithm [1]. Our implementation uses the bilateral grid...
IBPRIA
2009
Springer
15 years 2 months ago
A Scale Invariant Interest Point Detector for Discriminative Blob Detection
In this paper we present a novel scale invariant interest point detector of blobs which incorporates the idea of blob movement along the scales. This trajectory of the blobs throug...
Luis Ferraz, Xavier Binefa
ADBIS
1999
Springer
104views Database» more  ADBIS 1999»
15 years 2 months ago
Arbiter Meta-Learning with Dynamic Selection of Classifiers and Its Experimental Investigation
In data mining, the selection of an appropriate classifier to estimate the value of an unknown attribute for a new instance has an essential impact to the quality of the classifica...
Alexey Tsymbal, Seppo Puuronen, Vagan Y. Terziyan