Sciweavers

1443 search results - page 228 / 289
» Aging Users are Still Users
Sort
View
128
Voted
GLOBECOM
2008
IEEE
15 years 1 months ago
Bypassing Security Toolbars and Phishing Filters via DNS Poisoning
—Security toolbars are used to protect naive users against phishing attacks by displaying warnings on suspicious sites. Recently, web browsers have added built-in phishing filte...
Saeed Abu-Nimeh, Suku Nair
127
Voted
DAGM
2010
Springer
15 years 22 days ago
An Improved Histogram of Edge Local Orientations for Sketch-Based Image Retrieval
Content-based image retrieval requires a natural image (e.g, a photo) as query, but the absence of such a query image is usually the reason for a search. An easy way to express the...
Jose M. Saavedra, Benjamin Bustos
35
Voted
CORR
2010
Springer
58views Education» more  CORR 2010»
15 years 19 days ago
Channel-coded Collision Resolution by Exploiting Symbol Misalignment
In random-access networks, such as the IEEE 802.11 network, different users may transmit their packets simultaneously, resulting in packet collisions. Traditionally, the collided p...
Lu Lu, Soung Chang Liew, Shengli Zhang
CORR
2006
Springer
86views Education» more  CORR 2006»
15 years 17 days ago
Maximum Entropy MIMO Wireless Channel Models
In this contribution, models of wireless channels are derived from the maximum entropy principle, for several cases where only limited information about the propagation environmen...
Maxime Guillaud, Mérouane Debbah, Aris L. M...
85
Voted
CORR
2006
Springer
124views Education» more  CORR 2006»
15 years 17 days ago
Next Generation Language Resources using GRID
This paper presents a case study concerning the challenges and requirements posed by next generation language resources, realized as an overall model of open, distributed and coll...
Federico Calzolari, Eva Sassolini, Manuela Sassi, ...