Sciweavers

2371 search results - page 384 / 475
» Multivariable Utility Functions
Sort
View
CGF
2008
149views more  CGF 2008»
15 years 4 months ago
Image-based Aging Using Evolutionary Computing
Aging has considerable visual effects on the human face and is difficult to simulate using a universally-applicable global model. In this paper, we focus on the hypothesis that th...
Daniel Hubball, Min Chen, Phil W. Grant
COMCOM
2008
95views more  COMCOM 2008»
15 years 4 months ago
CHESS: An application-aware space for enhanced scalable services in overlay networks
Abstract-- We introduce in this paper CHESS, an applicationaware space for enhanced scalable services in overlay networks. In this new space, the proximity of peers is determined a...
Mohammad Malli, Chadi Barakat, Walid Dabbous
COMCOM
2008
91views more  COMCOM 2008»
15 years 4 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
139
Voted

Publication
116views
15 years 4 months ago
Poking Facebook: Characterization of OSN Applications
Facebook is one of the most popular Internet sites today. A key fea- ture that arguably contributed to Facebook's unprecedented success is its application platform, which enab...
Minas Gjoka, Michael Sirivianos, Athina Markopoulo...
CORR
2008
Springer
137views Education» more  CORR 2008»
15 years 4 months ago
Design and Implementation Aspects of a novel Java P2P Simulator with GUI
Peer-to-peer networks consist of thousands or millions of nodes that might join and leave arbitrarily. The evaluation of new protocols in real environments is many times practical...
Vassilios Chrissikopoulos, George Papaloukopoulos,...