Sciweavers

5948 search results - page 914 / 1190
» Computing Robust Counter-Strategies
Sort
View
ICPR
2006
IEEE
15 years 10 months ago
A Pixel-wise Object Tracking Algorithm with Target and Background Sample
In this paper, we present a clustering-based tracking algorithm for non-rigid object. Non-rigid object tracking is a challenging task because the target often appears as a concave...
Chunsheng Hua, Haiyuan Wu, Qian Chen, Toshikazu Wa...
ICPR
2006
IEEE
15 years 10 months ago
Gender Recognition in Non Controlled Environments
In most of the automatic face classification applications, images should be captured in natural environments, where partial occlusions or high local changes in the illumination a...
Àgata Lapedriza, Manuel J. Marín-Jim...
IPPS
2006
IEEE
15 years 10 months ago
Improving cooperation in peer-to-peer systems using social networks
Rational and selfish nodes in P2P systems usually lack effective incentives to cooperate, contributing to the increase of free-riders, and degrading the system performance. Variou...
Wenyu Wang, Li Zhao, Ruixi Yuan
IPPS
2006
IEEE
15 years 10 months ago
Privacy-aware presence management in instant messaging systems
Information about online presence allows participants of instant messaging (IM) systems to determine whether their prospective communication partners will be able to answer their ...
Karsten Loesing, Markus Dorsch, Martin Grote, Knut...
NDSS
2006
IEEE
15 years 10 months ago
Induced Churn as Shelter from Routing-Table Poisoning
Structured overlays are an important and powerful class of overlay networks that has emerged in recent years. They are typically targeted at peer-to-peer deployments involving mil...
Tyson Condie, Varun Kacholia, Sriram Sank, Joseph ...