Sciweavers

9719 search results - page 1725 / 1944
» Inference for Multiplicative Models
Sort
View
156
Voted
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
15 years 8 months ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
15 years 8 months ago
Design Experience of a Chip Multiprocessor Merlot and Expectation to Functional Verification
We have fabricated a Chip Multiprocessor prototype code-named Merlot to proof our novel speculative multithreading architecture. On Merlot, multiple threads provide wider issue wi...
Satoshi Matsushita
ACNS
2010
Springer
154views Cryptology» more  ACNS 2010»
15 years 8 months ago
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions
To this day, realizations in the standard-model of (lossy) trapdoor functions from discrete-log-type assumptions require large public key sizes, e.g., about Θ(λ2 ) group elements...
Xavier Boyen, Brent Waters
143
Voted
BICOB
2010
Springer
15 years 8 months ago
Biological Relevance Detection via Network Dynamic Analysis
Most existing approaches for gene selection are based on evaluating the statistical relevance. However, there are remarkable discrepancies between statistical relevance and biolog...
Zheng Zhao, Huan Liu, Jiangxin Wang, Yung Chang
161
Voted
CIVR
2010
Springer
254views Image Analysis» more  CIVR 2010»
15 years 8 months ago
Video scene analysis of interactions between humans and vehicles using event context
In this paper, we present a methodology to estimate a detailed state of a video scene involving multiple humans and vehicles. In order to annotate and retrieve videos containing a...
M. S. Ryoo, Jong Taek Lee, Jake K. Aggarwal
« Prev « First page 1725 / 1944 Last » Next »