Sciweavers

5246 search results - page 16 / 1050
» Sanitization models and their limitations
Sort
View
VALUETOOLS
2006
ACM
112views Hardware» more  VALUETOOLS 2006»
15 years 3 months ago
Performance of ad hoc networks with two-hop relay routing and limited packet lifetime
— Considered is a mobile ad hoc network consisting of three types of nodes (source, destination and relay nodes) and using the two-hop relay routing protocol. Packets at relay no...
Ahmad Al Hanbali, Philippe Nain, Eitan Altman
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
14 years 9 months ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash
85
Voted
IJCV
2008
241views more  IJCV 2008»
14 years 9 months ago
Object Class Recognition and Localization Using Sparse Features with Limited Receptive Fields
We investigate the role of sparsity and localized features in a biologically-inspired model of visual object classification. As in the model of Serre, Wolf, and Poggio, we first a...
Jim Mutch, David G. Lowe
73
Voted
WSC
2007
14 years 12 months ago
A Bayesian approach to analysis of limit standards
Limit standards are probabilistic requirements or benchmarks regarding the proportion of replications conforming or not conforming to a desired threshold. Sample proportions resul...
Roy R. Creasey Jr., K. Preston White Jr.
AMC
2006
96views more  AMC 2006»
14 years 9 months ago
Analog computation beyond the Turing limit
The main purpose of this paper is quite uncontroversial. First, we recall some models of analog computations (including these allowed to perform Turing uncomputable tasks). Second...
Jerzy Mycka