Sciweavers

4150 search results - page 631 / 830
» A Practical Approach to Model Extension
Sort
View
WCNC
2010
IEEE
15 years 8 months ago
MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks
—The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary modifies the delivery metrics of the ...
Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Ch...
168
Voted
FGR
2004
IEEE
323views Biometrics» more  FGR 2004»
15 years 7 months ago
Automatic 3D Reconstruction for Face Recognition
An analysis-by-synthesis framework for face recognition with variant pose, illumination and expression (PIE) is proposed in this paper. First, an efficient 2D-to-3D integrated fac...
Yuxiao Hu, Dalong Jiang, Shuicheng Yan, Lei Zhang,...
ECCV
2010
Springer
15 years 7 months ago
Binary coherent edge descriptors
Patch descriptors are used for a variety of tasks ranging from finding corresponding points across images, to describing object category parts. In this paper, we propose an image ...
USENIX
2008
15 years 6 months ago
Experiences with Client-based Speculative Remote Display
We propose an approach to remote display systems in which the client predicts the screen update events that the server will send and applies them to the screen immediately, thus e...
John R. Lange, Peter A. Dinda, Samuel Rossoff
SBBD
2004
128views Database» more  SBBD 2004»
15 years 5 months ago
Integrating Heterogeneous Data Sources in Flexible and Dynamic Environments
Flexible and dynamic environments are characterized by high independence from connection participants, low control over available services and high tolerance to communication fail...
Angelo Brayner, Marcelo Meirelles