Sciweavers

1443 search results - page 228 / 289
» Aging Users are Still Users
Sort
View
GLOBECOM
2008
IEEE
14 years 11 months ago
Bypassing Security Toolbars and Phishing Filters via DNS Poisoning
—Security toolbars are used to protect naive users against phishing attacks by displaying warnings on suspicious sites. Recently, web browsers have added built-in phishing filte...
Saeed Abu-Nimeh, Suku Nair
DAGM
2010
Springer
14 years 10 months ago
An Improved Histogram of Edge Local Orientations for Sketch-Based Image Retrieval
Content-based image retrieval requires a natural image (e.g, a photo) as query, but the absence of such a query image is usually the reason for a search. An easy way to express the...
Jose M. Saavedra, Benjamin Bustos
CORR
2010
Springer
58views Education» more  CORR 2010»
14 years 10 months ago
Channel-coded Collision Resolution by Exploiting Symbol Misalignment
In random-access networks, such as the IEEE 802.11 network, different users may transmit their packets simultaneously, resulting in packet collisions. Traditionally, the collided p...
Lu Lu, Soung Chang Liew, Shengli Zhang
CORR
2006
Springer
86views Education» more  CORR 2006»
14 years 9 months ago
Maximum Entropy MIMO Wireless Channel Models
In this contribution, models of wireless channels are derived from the maximum entropy principle, for several cases where only limited information about the propagation environmen...
Maxime Guillaud, Mérouane Debbah, Aris L. M...
CORR
2006
Springer
124views Education» more  CORR 2006»
14 years 9 months ago
Next Generation Language Resources using GRID
This paper presents a case study concerning the challenges and requirements posed by next generation language resources, realized as an overall model of open, distributed and coll...
Federico Calzolari, Eva Sassolini, Manuela Sassi, ...