Sciweavers

1080 search results - page 30 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
ICPR
2010
IEEE
15 years 7 months ago
Statistical Shape Modeling using Morphological Representations
The aim of this paper is to propose tools for statistical analysis of shape families using morphological operators. Given a series of shape families (or shape categories), the appr...
S. Velasco-Forero and J. Angulo
PAMI
2006
155views more  PAMI 2006»
14 years 11 months ago
Validating a Biometric Authentication System: Sample Size Requirements
Authentication systems based on biometric features (e.g., fingerprint impressions, iris scans, human face images, etc.) are increasingly gaining widespread use and popularity. Ofte...
Sarat C. Dass, Yongfang Zhu, Anil K. Jain
INFOCOM
2012
IEEE
13 years 10 months ago
Expected loss bounds for authentication in constrained channels
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy conditions and communication costs. This is motivated by a numbe...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
ACMACE
2006
ACM
15 years 5 months ago
An empirical evaluation of TCP performance in online games
A fundamental design question to ask in the development of a network game is—Which transport protocol should be used—TCP, UDP, or some other protocols? Seeking an objective an...
Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-L...
PEWASUN
2006
ACM
15 years 5 months ago
Experimental analysis of a transport protocol for ad hoc networks (TPA)
Many previous papers have pointed out that TCP performance in multi-hop ad hoc networks is not optimal. This is due to several TCP design principles that reflect the characteristi...
Giuseppe Anastasi, Emilio Ancillotti, Marco Conti,...