Sciweavers

10458 search results - page 1785 / 2092
» Modeling Features at Runtime
Sort
View
TMC
2012
13 years 6 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
17 years 3 months ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li
142
Voted

Source Code
1511views
17 years 2 months ago
VXL - The Vision-something-Libraries
VXL is a collection of C++ libraries designed for computer vision research and implementation. VXL is written in ANSI/ISO C++ and is designed to be portable over many platforms. Th...

Publication
314views
17 years 2 months ago
LED: Load Early Detection: A Congestion Control Algorithm based on Router Traffic Load
Efficient bandwidth allocation and low delays remain important goals, expecially in high-speed networks. Existing end-to-end congestion control schemes (such as TCP+AQM/RED) have s...
A. Durresi, P. Kandikuppa, M. Sridharan, S. Chella...
136
Voted
CVPR
2009
IEEE
16 years 10 months ago
Contextual Flow
Matching based on local brightness is quite limited, because small changes on local appearance invalidate the constancy in brightness. The root of this limitation is its treatme...
Ying Wu (Northwestern University), Jialue Fan (Nor...
« Prev « First page 1785 / 2092 Last » Next »