Sciweavers

4816 search results - page 959 / 964
» Performance analysis of the AntNet algorithm
Sort
View
PAMI
2007
133views more  PAMI 2007»
14 years 9 months ago
Generating Cancelable Fingerprint Templates
—Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several p...
Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Con...
GIS
2010
ACM
14 years 8 months ago
Ontuition: intuitive data exploration via ontology navigation
We present Ontuition, a system for mapping ontologies. Transforming data to a usable format for Ontuition involves recognizing and resolving data values corresponding to concepts ...
Marco D. Adelfio, Michael D. Lieberman, Hanan Same...
INFOCOM
2010
IEEE
14 years 8 months ago
Multihop Transmission Opportunity in Wireless Multihop Networks
—Wireless multihop communication is becoming more important due to the increasing popularity of wireless sensor networks, wireless mesh networks, and mobile social networks. They...
Chansu Yu, Tianning Shen, Kang G. Shin, Jeong-Yoon...
SISAP
2010
IEEE
135views Data Mining» more  SISAP 2010»
14 years 7 months ago
Improving the similarity search of tandem mass spectra using metric access methods
In biological applications, the tandem mass spectrometry is a widely used method for determining protein and peptide sequences from an ”in vitro” sample. The sequences are not...
Jiri Novák, Tomás Skopal, David Hoks...
ACSAC
2007
IEEE
15 years 1 months ago
Efficient Detection of Delay-Constrained Relay Nodes
Relay nodes are a potential threat to networks since they are used in many malicious situations like stepping stone attacks, botnet communication, peer-to-peer streaming etc. Quic...
Baris Coskun, Nasir D. Memon