Sciweavers

1776 search results - page 116 / 356
» Informational cascades in IT adoption
Sort
View
ICPR
2008
IEEE
15 years 8 months ago
Color face recognition based on 2DPCA
This paper presents a novel color face recognition approach based on 2DPCA. A matrix-representation model, which encodes the color information directly, is proposed to describe th...
Chengzhang Wang, Baocai Yin, Xiaoming Bai, Yanfeng...
ITNG
2008
IEEE
15 years 8 months ago
Chord-Based Key Establishment Schemes for Sensor Networks
— Because of limited resources at sensor nodes, sensor networks typically adopt symmetric-key algorithms to provide security functions such as protecting communications between n...
Fan Zhang, Zhijie Jerry Shi, Bing Wang
AIRS
2008
Springer
15 years 8 months ago
Using Multiple Combined Ranker for Answering Definitional Questions
This paper presents a Multiple Combined Ranker (MCR) approach for answering definitional questions. Generally, our MCR approach first extracts question target-related knowledge as ...
Junkuo Cao, Lide Wu, Xuanjing Huang, Yaqian Zhou, ...
FBIT
2007
IEEE
15 years 8 months ago
Simulating Biological Pathways with a Continuous Petri Net Using Runge-Kutta Methods
The application of Petri nets to analyze and simulate biological pathways has been developed vigorously. Some of the modifications of Petri nets appeared to perform quantitative a...
Sunku Kang, Byungwoo Lee, Jihoon Yang, Seonho Kim,...
99
Voted
ICC
2007
IEEE
121views Communications» more  ICC 2007»
15 years 8 months ago
An Architecture for Network Layer Privacy
— We present an architecture for the provision of network layer privacy based on the SHIM6 multihoming protocol. In its basic form, the architecture prevents on-path eavesdropper...
Marcelo Bagnulo, Alberto García-Martí...