Sciweavers

2392 search results - page 431 / 479
» Matching data dissemination algorithms to application requir...
Sort
View
KDD
2005
ACM
153views Data Mining» more  KDD 2005»
16 years 7 days ago
Improving discriminative sequential learning with rare--but--important associations
Discriminative sequential learning models like Conditional Random Fields (CRFs) have achieved significant success in several areas such as natural language processing, information...
Xuan Hieu Phan, Minh Le Nguyen, Tu Bao Ho, Susumu ...
CVPR
2011
IEEE
14 years 8 months ago
Real Time Head Pose Estimation with Random Regression Forests
Fast and reliable algorithms for estimating the head pose are essential for many applications and higher-level face analysis tasks. We address the problem of head pose estimation ...
Gabriele Fanelli, Juergen Gall, Luc VanGool
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
15 years 6 months ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron
CASES
2003
ACM
15 years 5 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
CORR
2010
Springer
197views Education» more  CORR 2010»
14 years 10 months ago
Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents
—Autonomous wireless agents such as unmanned aerial vehicles, mobile base stations, or self-operating wireless nodes present a great potential for deployment in next-generation w...
Walid Saad, Zhu Han, Tamer Basar, Mérouane ...