Sciweavers

368 search results - page 19 / 74
» System BV is NP-complete
Sort
View
DSS
2007
75views more  DSS 2007»
14 years 9 months ago
Short Term and Total Life Impact analysis of email worms in computer systems
This paper develops a methodology for analyzing and predicting the impact category of malicious code, particularly email worms. The current paper develops two frameworks to classi...
Insu Park, Raj Sharman, H. Raghav Rao, Shambhu J. ...
CSI
2004
186views more  CSI 2004»
14 years 9 months ago
Towards a BioAPI compliant face verification system
Standards are important to the growth and acceptance of emerging industries such as the biometric industry. To promote biometric standard, the BioAPI Consortium has developed a wi...
X. Yuan, Siu Cheung Hui, Maylor K. H. Leung, Yongs...
MAM
2007
143views more  MAM 2007»
14 years 9 months ago
A distributed admission control system for MANET environments supporting multipath routing protocols
Multipath routing protocols have proved to be able to enhance the performance of MANET in terms of reliability, load balancing, multimedia streaming, security, etc. However, deplo...
Carlos Miguel Tavares Calafate, José Oliver...
ICPR
2002
IEEE
15 years 10 months ago
Fingerprint Enhancement with Dyadic Scale-Space
Fingerprint enhancement is a critical step in automatic fingerprint verification system. Most of the existing enhancement uses a set of contextual filters to enhance fingerprint. ...
Jiangang Cheng, Jie Tian, Tanghui Zhang
IJON
2006
73views more  IJON 2006»
14 years 9 months ago
Selective attention implemented with dynamic synapses and integrate-and-fire neurons
Selective attention is a process widely used by biological sensory systems to overcome the problem of limited parallel processing capacity: salient subregions of the input stimuli...
Chiara Bartolozzi, Giacomo Indiveri