Sciweavers

1765 search results - page 243 / 353
» Combinations of Weak Classifiers
Sort
View
SENSYS
2005
ACM
15 years 9 months ago
Z-MAC: a hybrid MAC for wireless sensor networks
This paper presents the design, implementation and performance evaluation of a hybrid MAC protocol, called Z-MAC, for wireless sensor networks that combines the strengths of TDMA ...
Injong Rhee, Ajit Warrier, Mahesh Aia, Jeongki Min
IFIP
2005
Springer
15 years 9 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
INDOCRYPT
2005
Springer
15 years 9 months ago
Attack the Dragon
1 Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits. The original idea of the design is to use a nonlinear feedb...
Håkan Englund, Alexander Maximov
IWINAC
2005
Springer
15 years 9 months ago
Separation of Extracellular Spikes: When Wavelet Based Methods Outperform the Principle Component Analysis
spike separation is a basic prerequisite for analyzing of the cooperative neural behavior and neural code when registering extracelluIarly. Final performance of any spike sorting m...
Alexey N. Pavlov, Valeri A. Makarov, Ioulia Makaro...
VLDB
2005
ACM
93views Database» more  VLDB 2005»
15 years 9 months ago
The TEXTURE Benchmark: Measuring Performance of Text Queries on a Relational DBMS
We introduce a benchmark called TEXTURE (TEXT Under RElations) to measure the relative strengths and weaknesses of combining text processing with a relational workload in an RDBMS...
Vuk Ercegovac, David J. DeWitt, Raghu Ramakrishnan