Sciweavers

123 search results - page 4 / 25
» Multiple Identities in BitTorrent Networks
Sort
View
68
Voted
CSE
2009
IEEE
15 years 1 months ago
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs
Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard security requirements. furthermore, in many scenarios owner and user of devices do not a...
Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph
CVPR
2012
IEEE
13 years 3 days ago
A flow model for joint action recognition and identity maintenance
We propose a framework that performs action recognition and identity maintenance of multiple targets simultaneously. Instead of first establishing tracks using an appearance mode...
Sameh Khamis, Vlad I. Morariu, Larry S. Davis
72
Voted
ICDM
2009
IEEE
112views Data Mining» more  ICDM 2009»
15 years 4 months ago
Resolving Identity Uncertainty with Learned Random Walks
A pervasive problem in large relational databases is identity uncertainty which occurs when multiple entries in a database refer to the same underlying entity in the world. Relati...
Ted Sandler, Lyle H. Ungar, Koby Crammer
IJBC
2007
137views more  IJBC 2007»
14 years 9 months ago
Patterns of oscillation in a Ring of Identical Cells with Delayed Coupling
We investigate the behaviour of a neural network model consisting of three neurons with delayed self and nearest-neighbour connections. We give analytical results on the existence...
Sharene D. Bungay, Sue Ann Campbell
ECTEL
2007
Springer
15 years 3 months ago
Network Analysis of Repositories
In the paper an approach to analysis of the structure of repositories based on network analysis is proposed. The repository metadata can be transformed into several (one-mode or tw...
Vladimir Batagelj, Iztok Kavkler, Matija Lokar