Sciweavers

5246 search results - page 86 / 1050
» Sanitization models and their limitations
Sort
View
ICASSP
2008
IEEE
15 years 5 months ago
A GIS-like training algorithm for log-linear models with hidden variables
Conditional Random Fields (CRFs) are often estimated using an entropy based criterion in combination with Generalized Iterative Scaling (GIS). GIS offers, upon others, the immedi...
Georg Heigold, Thomas Deselaers, Ralf Schlüte...
ICASSP
2007
IEEE
15 years 5 months ago
Hash-Based Motion Modeling in Wyner-Ziv Video Coding
Generally, Distributed video coding (DVC) schemes perform motion estimation at the decoder side, without the current frame being available. In order to generate the side-informati...
Marco Tagliasacchi, Stefano Tubaro
DCOSS
2010
Springer
15 years 4 months ago
Programming Sensor Networks Using Remora Component Model
Abstract. The success of high-level programming models in Wireless Sensor Networks (WSNs) is heavily dependent on factors such as ease of programming, code well-structuring, degree...
Amirhosein Taherkordi, Frédéric Loir...
CSIE
2009
IEEE
15 years 4 months ago
Scenario-Based Traffic Modeling for Data Emanating from Medical Instruments in Clinical Environment
In this paper, the application of individual scenario-based traffic models in identifying the traffic carrying needs of networks in patient monitoring environments is presented. S...
Aftab Ahmad, Anton Riedl, W. Jason Naramore, Nee-Y...
ESORICS
2006
Springer
15 years 3 months ago
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to over...
Hai Wang, Peng Liu