Sciweavers

1737 search results - page 127 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
TCOM
2010
144views more  TCOM 2010»
15 years 3 months ago
Transmission Radius Control in Wireless Ad Hoc Networks with Smart Antennas
—In this paper, we present a model to analyze the performance of three transmission strategies with smart antennas, i.e. directional antennas with adjustable transmission power. ...
Fei Huang, Ka-Cheong Leung, Victor O. K. Li
APVIS
2008
15 years 6 months ago
MobiVis: A Visualization System for Exploring Mobile Data
The widespread use of mobile devices brings opportunities to capture large-scale, continuous information about human behavior. Mobile data has tremendous value, leading to busines...
Zeqian Shen, Kwan-Liu Ma
ICIP
2002
IEEE
16 years 6 months ago
Hybrid and parallel face classifier based on artificial neural networks and principal component analysis
We present a hybrid and parallel system based on artificial neural networks for a face invariant classifier and general pattern recognition problems. A set of face features is ext...
Peter V. Bazanov, Tae-Kyun Kim, Seok-Cheol Kee, Sa...
PET
2007
Springer
15 years 11 months ago
Two-Sided Statistical Disclosure Attack
We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, that tries to uncover the receivers of messages sent through an anonymizing network support...
George Danezis, Claudia Díaz, Carmela Tronc...
DSN
2004
IEEE
15 years 8 months ago
Optimal Object State Transfer - Recovery Policies for Fault Tolerant Distributed Systems
Recent developments in the field of object-based fault tolerance and the advent of the first OMG FTCORBA compliant middleware raise new requirements for the design process of dist...
Panagiotis Katsaros, Constantine Lazos