Sciweavers

10988 search results - page 2188 / 2198
» Algorithmic Folding Complexity
Sort
View
ICPR
2010
IEEE
14 years 12 months ago
Patch-Based Similarity HMMs for Face Recognition with a Single Reference Image
In this paper we present a new architecture for face recognition with a single reference image, which completely separates the training process from the recognition process. In th...
Ngoc-Son Vu, Alice Caplier
157
Voted
IMC
2010
ACM
14 years 11 months ago
Eyeball ASes: from geography to connectivity
This paper presents a new approach to determine the geographical footprint of individual Autonomous Systems that directly provide service to end-users, i.e.,eyeball ASes. The key ...
Amir H. Rasti, Nazanin Magharei, Reza Rejaie, Walt...
IPPS
2010
IEEE
14 years 11 months ago
Acceleration of spiking neural networks in emerging multi-core and GPU architectures
Recently, there has been strong interest in large-scale simulations of biological spiking neural networks (SNN) to model the human brain mechanisms and capture its inference capabi...
Mohammad A. Bhuiyan, Vivek K. Pallipuram, Melissa ...
123
Voted
SECON
2010
IEEE
14 years 11 months ago
Utility-Based Gateway Deployment for Supporting Multi-Domain DTNs
Abstract--Due to technology or policy constraints, communications across network domains usually require the intervention of gateways, and their proper deployment is crucial to the...
Ting He, Kang-Won Lee, Nikoletta Sofra, Kin K. Leu...
139
Voted
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
14 years 11 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
« Prev « First page 2188 / 2198 Last » Next »