Sciweavers

1167 search results - page 176 / 234
» Substitution-closed pattern classes
Sort
View
CVPR
2005
IEEE
15 years 3 months ago
Jensen-Shannon Boosting Learning for Object Recognition
In this paper, we propose a novel learning method, called Jensen-Shannon Boosting (JSBoost) and demonstrate its application to object recognition. JSBoost incorporates Jensen-Shan...
Xiangsheng Huang, Stan Z. Li, Yangsheng Wang
ECRTS
2005
IEEE
15 years 3 months ago
Scheduling Tasks with Markov-Chain Based Constraints
Markov-Chain (MC) based constraints have been shown to be an effective QoS measure for a class of real-time systems, particularly those arising from control applications. Scheduli...
Donglin Liu, Xiaobo Sharon Hu, Michael D. Lemmon, ...
ICDCS
2005
IEEE
15 years 3 months ago
On Flow Marking Attacks in Wireless Anonymous Communication Networks
— This paper studies the degradation of anonymity in a flow-based wireless mix network under flow marking attacks, in which an adversary embeds a recognizable pattern of marks ...
Xinwen Fu, Ye Zhu, Bryan Graham, Riccardo Bettati,...
ICNP
2005
IEEE
15 years 3 months ago
On the Stability of Rational, Heterogeneous Interdomain Route Selection
The recent discovery of instability caused by the interaction of local routing policies of multiple ASes has led to extensive research on the subject. However, previous studies an...
Hao Wang, Haiyong Xie 0002, Yang Richard Yang, Avi...
ISVLSI
2005
IEEE
101views VLSI» more  ISVLSI 2005»
15 years 3 months ago
eWatch: Context Sensitive System Design Case Study
In this paper, we introduce a novel context sensitive system design paradigm. Multiple sensors/ computational architecture, in the form of our eWatch device, is used to infer the ...
Asim Smailagic, Daniel P. Siewiorek, Uwe Maurer, A...