Sciweavers

2680 search results - page 339 / 536
» The topology of the independence complex
Sort
View
105
Voted
ICNS
2007
IEEE
15 years 8 months ago
Towards System-level Optimization for High Performance Unified Threat Management
To build holistic protection against complex and blended network threats, multiple security features need to be integrated into a unified security architecture, which requires in ...
Yaxuan Qi, Baohua Yang, Bo Xu, Jun Li
FC
2007
Springer
111views Cryptology» more  FC 2007»
15 years 8 months ago
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting
A multi-coupon (MC) represents a collection of k coupons that a user can redeem to a vendor in exchange for some goods or services. Nguyen (FC 2006), deepening the ideas of Chen et...
Liqun Chen, Alberto N. Escalante, Hans Löhr, ...
GFKL
2007
Springer
148views Data Mining» more  GFKL 2007»
15 years 8 months ago
Mixture Model Based Group Inference in Fused Genotype and Phenotype Data
The analysis of genetic diseases has classically been directed towards establishing direct links between cause, a genetic variation, and effect, the observable deviation of phenot...
Benjamin Georgi, M. Anne Spence, Pamela Flodman, A...
AVSS
2006
IEEE
15 years 8 months ago
The Role of Motion Models in Super-Resolving Surveillance Video for Face Recognition
Although the use of super-resolution techniques has demonstrated the ability to improve face recognition accuracy when compared to traditional upsampling techniques, they are dif...
Frank Lin, Clinton Fookes, Vinod Chandran, Sridha ...
IJCNN
2006
IEEE
15 years 8 months ago
Bi-directional Modularity to Learn Visual Servoing Tasks
— This paper shows the advantage of using neural network modularity over conventional learning schemes to approximate complex functions. Indeed, it is difficult for artificial ...
Gilles Hermann, Patrice Wira, Jean-Philippe Urban