Sciweavers

7544 search results - page 1357 / 1509
» Network Forensics Analysis
Sort
View
ICIAP
2003
ACM
15 years 9 months ago
PCA vs low resolution images in face verification
Principal Components Analysis (PCA) has been one of the most applied methods for face verification using only 2D information, in fact, PCA is practically the method of choice for ...
Cristina Conde, Antonio Ruiz, Enrique Cabello
ICIAP
2003
ACM
15 years 9 months ago
Multi-block PCA method for image change detection
Principal component analyses (PCA) has been widely used in reduction of the dimensionality of datasets, classification, feature extraction, etc. It has been combined with many oth...
B. Qiu, Véronique Prinet, Edith Perrier, Ol...
DATE
2010
IEEE
166views Hardware» more  DATE 2010»
15 years 9 months ago
From transistors to MEMS: Throughput-aware power gating in CMOS circuits
—In this paper we study the effectiveness of two power gating methods – transistor switches and MEMS switches – in reducing the power consumption of a design with a certain t...
Michael B. Henry, Leyla Nazhandali
HT
2010
ACM
15 years 9 months ago
Discovery of information disseminators and receptors on online social media
Today, there is significant sharing of information artifacts among users on various social media sites, including Digg, Twitter and Flickr. An interesting consequence of such ric...
Munmun De Choudhury
ACSAC
2002
IEEE
15 years 9 months ago
Security of Internet Location Management
In the Mobile IPv6 protocol, the mobile node sends binding updates to its correspondents to inform them about its current location. It is well-known that the origin of this locati...
Tuomas Aura, Michael Roe, Jari Arkko
« Prev « First page 1357 / 1509 Last » Next »