Sciweavers

2229 search results - page 359 / 446
» On Reporting Fold Differences
Sort
View
INFOCOM
2011
IEEE
14 years 1 months ago
Identity-based attack detection in mobile wireless networks
—Identity-based attacks (IBAs) are one of the most serious threats to wireless networks. Recently, received signal strength (RSS) based detection mechanisms were proposed to dete...
Kai Zeng, Kannan Govindan, Daniel Wu, Prasant Moha...
NAR
2011
225views Computer Vision» more  NAR 2011»
14 years 21 days ago
PHOSIDA 2011: the posttranslational modification database
The primary purpose of PHOSIDA (http://www .phosida.com) is to manage posttranslational modification sites of various species ranging from bacteria to human. Since its last report...
Florian Gnad, Jeremy Gunawardena, Matthias Mann 00...
PAM
2011
Springer
14 years 21 days ago
Operating a Network Link at 100%
Abstract. Internet speed at the edge is increasing fast with the spread of fiberbased broadband technology. The appearance of bandwidth-consuming applications, such as peer-to-pee...
Changhyun Lee, D. K. Lee, Yung Yi, Sue B. Moon
SISAP
2011
IEEE
437views Data Mining» more  SISAP 2011»
14 years 20 days ago
Succinct nearest neighbor search
In this paper we present a novel technique for nearest neighbor searching dubbed neighborhood approximation. The central idea is to divide the database into compact regions repres...
Eric Sadit Tellez, Edgar Chávez, Gonzalo Na...
ICCV
2011
IEEE
13 years 10 months ago
Maximizing All Margins: Pushing Face Recognition with Kernel Plurality
We present two theses in this paper: First, performance of most existing face recognition algorithms improves if instead of the whole image, smaller patches are individually class...
Ritwik Kumar, Arunava Banerjee, CISE, Univ, Baba V...