Sciweavers

5948 search results - page 266 / 1190
» Computing Robust Counter-Strategies
Sort
View
133
Voted
ISVC
2007
Springer
15 years 10 months ago
Iris Recognition: An Entropy-Based Coding Strategy Robust to Noisy Imaging Environments
Abstract. The iris is currently accepted as one of the most accurate traits for biometric purposes. However, for the sake of accuracy, iris recognition systems rely on good quality...
Hugo Proença, Luís A. Alexandre
WDAG
2007
Springer
79views Algorithms» more  WDAG 2007»
15 years 10 months ago
A Simple Population Protocol for Fast Robust Approximate Majority
We describe and analyze a 3-state one-way population protocol to compute approximate majority in the model in which pairs of agents are drawn uniformly at random to interact. Given...
Dana Angluin, James Aspnes, David Eisenstat
IOLTS
2006
IEEE
103views Hardware» more  IOLTS 2006»
15 years 10 months ago
Designing Robust Checkers in the Presence of Massive Timing Errors
So far, performance and reliability of circuits have been determined by worst-case characterization of silicon and environmental noise. As new deep sub-micron technologies exacerb...
Frederic Worm, Patrick Thiran, Paolo Ienne
ITNG
2006
IEEE
15 years 10 months ago
A Decentralized Network Coordinate System for Robust Internet Distance
Network distance, measured as round-trip latency between hosts, is important for the performance of many Internet applications. For example, nearest server selection and proximity...
Li-wei Lehman, Steven Lerman
P2P
2006
IEEE
130views Communications» more  P2P 2006»
15 years 10 months ago
The Effect of Replica Placement on Routing Robustness in Distributed Hash Tables
To achieve higher efficiency over their unstructured counterparts, structured peer-to-peer systems hold each node responsible for serving a specified set of keys and correctly r...
Cyrus Harvesf, Douglas M. Blough