Sciweavers

2846 search results - page 489 / 570
» Personalization of a Trust Network
Sort
View
TNN
2008
94views more  TNN 2008»
15 years 15 days ago
Individual Stable Space: An Approach to Face Recognition Under Uncontrolled Conditions
There usually exist many kinds of variations in face images taken under uncontrolled conditions, such as changes of pose, illumination, expression, etc. Most previous works on fac...
Xin Geng, Zhi-Hua Zhou, Kate Smith-Miles
TPDS
2008
115views more  TPDS 2008»
15 years 14 days ago
An Adaptive GTS Allocation Scheme for IEEE 802.15.4
IEEE 802.15.4 is a new standard uniquely designed for low-rate wireless personal area networks. It targets ultralow complexity, cost, and power for low-rate wireless connectivity a...
Yu-Kai Huang, Ai-Chun Pang, Hui-Nien Hung
87
Voted
COMPSEC
2002
185views more  COMPSEC 2002»
15 years 11 days ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
INFORMATICALT
2002
131views more  INFORMATICALT 2002»
15 years 8 days ago
An Agent-Based Architecture for Customer Services Management and Product Search
The amount of products and services available over the Internet increases significantly and it soon becomes beyond users ability to analyze and compare them. At the same time the n...
Thomas Heiberg, Mihhail Matskin, Jøran Pede...
TIT
1998
127views more  TIT 1998»
15 years 7 days ago
The Art of Signaling: Fifty Years of Coding Theory
—In 1948 Shannon developed fundamental limits on the efficiency of communication over noisy channels. The coding theorem asserts that there are block codes with code rates arbit...
A. Robert Calderbank