Sciweavers

3480 search results - page 155 / 696
» A New Era of Performance Evaluation
Sort
View
SUTC
2006
IEEE
15 years 7 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
ISMIR
2005
Springer
164views Music» more  ISMIR 2005»
15 years 7 months ago
Theory and Evaluation of a Bayesian Music Structure Extractor
We introduce a new model for extracting classified structural segments, such as intro, verse, chorus, break and so forth, from recorded music. Our approach is to classify signal ...
Samer A. Abdallah, Katy Noland, Mark B. Sandler, M...
CHES
2003
Springer
100views Cryptology» more  CHES 2003»
15 years 7 months ago
Security Evaluation of Asynchronous Circuits
Abstract. Balanced asynchronous circuits have been touted as a superior replacement for conventional synchronous circuits. To assess these claims, we have designed, manufactured an...
Jacques J. A. Fournier, Simon W. Moore, Huiyun Li,...
SSDBM
2010
IEEE
248views Database» more  SSDBM 2010»
15 years 6 months ago
Client + Cloud: Evaluating Seamless Architectures for Visual Data Analytics in the Ocean Sciences
Science is becoming data-intensive, requiring new software architectures that can exploit resources at all scales: local GPUs for interactive visualization, server-side multi-core ...
Keith Grochow, Bill Howe, Mark Stoermer, Roger S. ...
SCALESPACE
2001
Springer
15 years 6 months ago
A Multi-scale Feature Likelihood Map for Direct Evaluation of Object Hypotheses
This paper develops and investigates a new approach for evaluating feature based object hypotheses in a direct way. The idea is to compute a feature likelihood map (FLM), which is ...
Ivan Laptev, Tony Lindeberg