Sciweavers

1717 search results - page 314 / 344
» Error concealment using a diffusion based method
Sort
View
CHI
2008
ACM
15 years 10 months ago
Love and authentication
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...
INFOCOM
2008
IEEE
15 years 4 months ago
Temporal Delay Tomography
Abstract—Multicast-based network tomography enables inference of average loss rates and delay distributions of internal network links from end-to-end measurements of multicast pr...
Vijay Arya, Nick G. Duffield, Darryl Veitch
ICDM
2007
IEEE
254views Data Mining» more  ICDM 2007»
15 years 4 months ago
Sampling for Sequential Pattern Mining: From Static Databases to Data Streams
Sequential pattern mining is an active field in the domain of knowledge discovery. Recently, with the constant progress in hardware technologies, real-world databases tend to gro...
Chedy Raïssi, Pascal Poncelet
MLDM
2007
Springer
15 years 3 months ago
Selection of Experts for the Design of Multiple Biometric Systems
Abstract. In the biometric field, different experts are combined to improve the system reliability, as in many application the performance attained by individual experts (i.e., d...
Roberto Tronci, Giorgio Giacinto, Fabio Roli
MICCAI
2005
Springer
15 years 3 months ago
Automatic Segmentation of Intra-treatment CT Images for Adaptive Radiation Therapy of the Prostate
Abstract. We have been developing an approach for automatically quantifying organ motion for adaptive radiation therapy of the prostate. Our approach is based on deformable image r...
B. C. Davis, Mark Foskey, Julian Rosenman, L. Goya...