Sciweavers

3394 search results - page 620 / 679
» A Modal Model of Memory
Sort
View
100
Voted

Publication
145views
14 years 8 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
141
Voted
TCSV
2011
14 years 7 months ago
Mixture of Gaussians-Based Background Subtraction for Bayer-Pattern Image Sequences
This paper proposes a background subtraction method for Bayer-pattern image sequences. The proposed method models the background in a Bayer-pattern domain using a mixture of Gauss...
Jae Kyu Suhr, Ho Gi Jung, Gen Li, Jaihie Kim
133
Voted
JCIT
2010
148views more  JCIT 2010»
14 years 7 months ago
Investigating the Performance of Naive- Bayes Classifiers and K- Nearest Neighbor Classifiers
Probability theory is the framework for making decision under uncertainty. In classification, Bayes' rule is used to calculate the probabilities of the classes and it is a bi...
Mohammed J. Islam, Q. M. Jonathan Wu, Majid Ahmadi...
SOSYM
2010
119views more  SOSYM 2010»
14 years 7 months ago
Formal specification of non-functional properties of component-based software systems
Component-based software engineering (CBSE) is viewed as an opportunity to deal with the increasing complexity of modern-day software. Along with CBSE comes the notion of component...
Steffen Zschaler
TIT
2010
170views Education» more  TIT 2010»
14 years 7 months ago
Correcting charge-constrained errors in the rank-modulation scheme
We investigate error-correcting codes for a the rank-modulation scheme with an application to flash memory devices. In this scheme, a set of n cells stores information in the permu...
Anxiao Jiang, Moshe Schwartz, Jehoshua Bruck