Sciweavers

8575 search results - page 1366 / 1715
» A Model of Learning Using the Internet
Sort
View
MOBICOM
2004
ACM
15 years 10 months ago
End-to-end performance and fairness in multihop wireless backhaul networks
Wireless IEEE 802.11 networks in residences, small businesses, and public “hot spots” typically encounter the wireline access link (DSL, cable modem, T1, etc.) as the slowest ...
Violeta Gambiroza, Bahareh Sadeghi, Edward W. Knig...
ICWSM
2009
15 years 2 months ago
Content Based Recommendation and Summarization in the Blogosphere
This paper presents a stochastic graph based method for recommending or selecting a small subset of blogs that best represents a much larger set. within a certain topic. Each blog...
Ahmed Hassan, Dragomir R. Radev, Junghoo Cho, Amru...
CCS
2010
ACM
15 years 1 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
ICPR
2006
IEEE
16 years 5 months ago
GMM-based SVM for face recognition
A new face recognition algorithm is presented. It supposes that a video sequence of a person is available both at enrollment and test time. During enrollment, a client Gaussian Mi...
Gérard Chollet, Hervé Bredin, Najim ...
138
Voted
ICPR
2004
IEEE
16 years 5 months ago
Estimation of the Bayesian Network Architecture for Object Tracking in Video Sequences
It was recently proposed the use of Bayesian networks for object tracking. Bayesian networks allow to model the interaction among detected trajectories, in order to obtain a relia...
Arnaldo J. Abrantes, Jorge S. Marques, Pedro Mende...
« Prev « First page 1366 / 1715 Last » Next »