Sciweavers

1511 search results - page 234 / 303
» Randomness, lowness and degrees
Sort
View
NCA
2006
IEEE
15 years 5 months ago
JetStream: Achieving Predictable Gossip Dissemination by Leveraging Social Network Principles
Gossip protocols provide probabilistic reliability and scalability, but their inherent randomness may lead to high variation in number of messages that are received at different n...
Jay A. Patel, Indranil Gupta, Noshir S. Contractor
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
15 years 5 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
PEWASUN
2006
ACM
15 years 5 months ago
Revisiting neighbor discovery with interferences consideration
In wireless multi-hop networks, hello protocols for neighbor discovery are a basic service offered by the networking stack. However, their study usually rely on rather simplistic...
Elyes Ben Hamida, Guillaume Chelius, Eric Fleury
ICMCS
2005
IEEE
161views Multimedia» more  ICMCS 2005»
15 years 5 months ago
Gender identification using frontal facial images
Computer vision and pattern recognition systems play an important role in our lives by means of automated face detection, face and gesture recognition, and estimation of gender an...
Amit Jain, Jeffrey Huang, Shiaofen Fang
WOWMOM
2005
ACM
108views Multimedia» more  WOWMOM 2005»
15 years 5 months ago
Reducing Inter-Cluster TDMA Interference by Adaptive MAC Allocation in Sensor Networks
This paper presents a Self-Reorganizing Slot Allocation (SRSA) mechanism for TDMA based Medium Access Control (MAC) in multi-cluster sensor networks. The aim is to provide a MAC l...
Tao Wu, Subir K. Biswas