Sciweavers

634 search results - page 91 / 127
» Groundwork for Weak Analysis
Sort
View
GLOBECOM
2008
IEEE
15 years 8 months ago
Jamming ACK Attack to Wireless Networks and a Mitigation Approach
— In many Medium Access Control (MAC) schemes for wireless networks, an Acknowledgment (ACK) packet is transmitted from the data receiver to the data sender to announce the succe...
Zhiguo Zhang, Jingqi Wu, Jing Deng, Meikang Qiu
112
Voted
ICC
2008
IEEE
134views Communications» more  ICC 2008»
15 years 8 months ago
Secret Little Functions and Codebook for Protecting Users from Password Theft
—In this paper, we discuss how to prevent users’ passwords from being stolen by adversaries. We propose differentiated security mechanisms in which a user has the freedom to ch...
Yang Xiao, Chung-Chih Li, Ming Lei, Susan V. Vrbsk...
C5
2007
IEEE
15 years 8 months ago
Wild, Wild Wikis: A way forward
Wikis can be considered as public domain knowledge sharing system. They provide opportunity for those who may not have the privilege to publish their thoughts through the traditio...
Robert Charles, Adigun Ranmi
ICCV
2007
IEEE
15 years 8 months ago
Laplacian PCA and Its Applications
Dimensionality reduction plays a fundamental role in data processing, for which principal component analysis (PCA) is widely used. In this paper, we develop the Laplacian PCA (LPC...
Deli Zhao, Zhouchen Lin, Xiaoou Tang
ICIP
2007
IEEE
15 years 8 months ago
Graph Cut Segmentation with Nonlinear Shape Priors
Graph cut image segmentation with intensity information alone is prone to fail for objects with weak edges, in clutter, or under occlusion. Existing methods to incorporate shape a...
James G. Malcolm, Yogesh Rathi, Allen Tannenbaum