Sciweavers

11573 search results - page 2170 / 2315
» Designing Relational Databases
Sort
View
ICC
2008
IEEE
132views Communications» more  ICC 2008»
15 years 9 months ago
Contourlet Based Image Compression for Wireless Communication in Face Recognition System
—This paper proposes to use Contourlet transform for image compression and feature extraction for wireless face recognition system. The properties of face images and face recogni...
Yanjun Yan, Rajani Muraleedharan, Xiang Ye, Lisa A...
111
Voted
IJCNN
2008
IEEE
15 years 9 months ago
On-line bagging Negative Correlation Learning
— Negative Correlation Learning (NCL) has been showing to outperform other ensemble learning approaches in off-line mode. A key point to the success of NCL is that the learning o...
Fernanda L. Minku, Xin Yao
INFOCOM
2008
IEEE
15 years 9 months ago
A Novel Quantitative Approach For Measuring Network Security
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan
MOBIQUITOUS
2008
IEEE
15 years 9 months ago
How to edit gigabyte XML files on a mobile phone with XAS, RefTrees, and RAXS
The Open Source mobility middleware developed in the Fuego Core project provides a stack for efficient XML processing on limited devices. Its components are a persistent map API, ...
Tancred Lindholm, Jaakko Kangasharju
117
Voted
NDSS
2008
IEEE
15 years 9 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion
« Prev « First page 2170 / 2315 Last » Next »