Sciweavers

4616 search results - page 330 / 924
» Extreme Components Analysis
Sort
View
WCE
2007
15 years 6 months ago
Face Recognition using Discrete Cosine Transform plus Linear Discriminant Analysis
—Face recognition is a biometric identification method which among the other methods such as, finger print identification, speech recognition, signature and hand written recognit...
M. Hajiarbabi, J. Askari, S. Sadri, M. Saraee
ENTCS
2006
173views more  ENTCS 2006»
15 years 4 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
JAR
2008
115views more  JAR 2008»
15 years 4 months ago
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
The spreading of multicast technology enables the development of group communication and so dealing with digital streams becomes more and more common over the Internet. Given the f...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...
131
Voted
MCS
2008
Springer
15 years 4 months ago
Three-factor profile analysis with GARCH innovations
The technique of ANOVA has been widely used in Economics and Finance where the observations are usually time-dependent but the model itself is treated as independent in time. In t...
Pui-Lam Leung, Wing-Keung Wong
TCAD
2008
75views more  TCAD 2008»
15 years 4 months ago
An Efficient Graph-Based Algorithm for ESD Current Path Analysis
Abstract--The electrostatic discharge (ESD) problem has become a challenging reliability issue in nanometer-circuit design. High voltages that resulted from ESD might cause high cu...
Chih-Hung Liu, Hung-Yi Liu, Chung-Wei Lin, Szu-Jui...