Sciweavers

755 search results - page 83 / 151
» Online selection of diverse results
Sort
View
FC
2007
Springer
122views Cryptology» more  FC 2007»
15 years 3 months ago
What Instills Trust? A Qualitative Study of Phishing
This paper reports the highlights of a user study which gauges reactions to a variety of common “trust indicators” – such as logos, third party endorsements, and padlock icon...
Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevi...
CVPR
2006
IEEE
15 years 11 months ago
Performance Modeling and Prediction of Face Recognition Systems
It is a challenging task to accurately model the performance of a face recognition system, and to predict its individual recognition results under various environments. This paper...
Peng Wang, Qiang Ji
GLOBECOM
2007
IEEE
15 years 4 months ago
Graph Theoretical Analysis of Opportunistic Scheduling Policy for Wireless Ad Hoc Networks
— 1 Taking advantage of the independent fading channel conditions among multiple wireless users, opportunistic transmissions schedule the user with the instantaneously best condi...
Qing Chen, Fei Ye, Zhisheng Niu
NOMS
2008
IEEE
108views Communications» more  NOMS 2008»
15 years 4 months ago
Autonomic QoS optimization of real-time internet audio using loss prediction and stochastic control
— Quality of Internet audio is highly sensitive to packet loss caused by congestion in the links. Packet loss for audio is normally rectified by adding redundancy using Forward ...
Lopa Roychoudhuri, Ehab S. Al-Shaer
ICMCS
2007
IEEE
120views Multimedia» more  ICMCS 2007»
15 years 4 months ago
Optimal Scheduling of Media Packets with Multiple Distortion Measures
Due to the increase in diversity of wireless devices, streaming media systems must be capable of serving multiple types of users. Scalable coding allows for adaptations without re...
Carri W. Chan, Nicholas Bambos, Susie Wee, John G....