Sciweavers

3707 search results - page 65 / 742
» A Simple Technique for Self-Calibration
Sort
View
SRDS
2008
IEEE
15 years 4 months ago
An Empirical Study of Denial of Service Mitigation Techniques
We present an empirical study of the resistance of several protocols to denial of service (DoS) attacks on client-server communication. We show that protocols that use authenticat...
Gal Badishi, Amir Herzberg, Idit Keidar, Oleg Roma...
ESORICS
2007
Springer
15 years 4 months ago
Encryption Techniques for Secure Database Outsourcing
Abstract. While the idea of database outsourcing is becoming increasingly popular, the associated security risks still prevent many potential users from deploying it. In particular...
Sergei Evdokimov, Oliver Günther
GECCO
2007
Springer
156views Optimization» more  GECCO 2007»
15 years 4 months ago
Techniques for highly multiobjective optimisation: some nondominated points are better than others
The research area of evolutionary multiobjective optimization (EMO) is reaching better understandings of the properties and capabilities of EMO algorithms, and accumulating much e...
David W. Corne, Joshua D. Knowles
FGR
2006
IEEE
180views Biometrics» more  FGR 2006»
15 years 4 months ago
A New Look at Filtering Techniques for Illumination Invariance in Automatic Face Recognition
Illumination invariance remains the most researched, yet the most challenging aspect of automatic face recognition. In this paper we propose a novel, general recognition framework...
Ognjen Arandjelovic, Roberto Cipolla
ICNP
2000
IEEE
15 years 2 months ago
SCalable Object-tracking through Unattended Techniques (SCOUT)
A scalable object location service can enable users to search for various objects in an environment where many small, networked devices are attached to objects. We investigate two...
Satish Kumar, Cengiz Alaettinoglu, Deborah Estrin