Sciweavers

1414 search results - page 248 / 283
» Combining Intruder Theories
Sort
View
FGR
2008
IEEE
221views Biometrics» more  FGR 2008»
15 years 4 months ago
Markovian mixture face recognition with discriminative face alignment
A typical automatic face recognition system is composed of three parts: face detection, face alignment and face recognition. Conventionally, these three parts are processed in a b...
Ming Zhao 0003, Tat-Seng Chua
HPDC
2008
IEEE
15 years 4 months ago
Improving peer connectivity in wide-area overlays of virtual workstations
Self-configuring virtual networks rely on structured P2P routing to provide seamless connectivity among nodes through overlay routing of virtual IP packets, support decentralized...
Arijit Ganguly, P. Oscar Boykin, David Wolinsky, R...
ICASSP
2008
IEEE
15 years 4 months ago
Transmit codes and receive filters for pulse compression radar systems
Pulse compression radar systems make use of transmit code sequences and receive filters that are specially designed to achieve good range resolution and target detection capabili...
Petre Stoica, Jian Li, Ming Xue
IDEAS
2008
IEEE
80views Database» more  IDEAS 2008»
15 years 4 months ago
Improved count suffix trees for natural language data
With more and more natural language text stored in databases, handling respective query predicates becomes very important. Optimizing queries with predicates includes (sub)string ...
Guido Sautter, Cristina Abba, Klemens Böhm
SECON
2008
IEEE
15 years 4 months ago
Optimal Buffer Management Policies for Delay Tolerant Networks
—Delay Tolerant Networks are wireless networks where disconnections may occur frequently due to propagation phenomena, node mobility, and power outages. Propagation delays may al...
Amir Krifa, Chadi Barakat, Thrasyvoulos Spyropoulo...