—Identity-based attacks (IBAs) are one of the most serious threats to wireless networks. Recently, received signal strength (RSS) based detection mechanisms were proposed to dete...
Kai Zeng, Kannan Govindan, Daniel Wu, Prasant Moha...
The primary purpose of PHOSIDA (http://www .phosida.com) is to manage posttranslational modification sites of various species ranging from bacteria to human. Since its last report...
Florian Gnad, Jeremy Gunawardena, Matthias Mann 00...
Abstract. Internet speed at the edge is increasing fast with the spread of fiberbased broadband technology. The appearance of bandwidth-consuming applications, such as peer-to-pee...
In this paper we present a novel technique for nearest neighbor searching dubbed neighborhood approximation. The central idea is to divide the database into compact regions repres...
We present two theses in this paper: First, performance of most existing face recognition algorithms improves if instead of the whole image, smaller patches are individually class...
Ritwik Kumar, Arunava Banerjee, CISE, Univ, Baba V...