Sciweavers

300 search results - page 30 / 60
» Vertex Cover: Further Observations and Further Improvements
Sort
View
69
Voted
CHI
2010
ACM
15 years 4 months ago
Using reinforcement to strengthen users' secure behaviors
Users have a strong tendency toward dismissing security dialogs unthinkingly. Prior research has shown that users' responses to security dialogs become significantly more tho...
Ricardo Villamarín-Salomón, Jos&eacu...
ICPR
2008
IEEE
15 years 4 months ago
Enhanced speaker recognition based on intra-modal fusion and accent modeling
Speaker recognition systems, even though they have been around for four decades, have not been widely considered as standalone systems for biometric security because of their unac...
Srikanth Mangayyagari, Tanmoy Islam, Ravi Sankar
ICNP
2007
IEEE
15 years 4 months ago
Multicast Algorithms for Multi-Channel Wireless Mesh Networks
— Multicast is a key technology that provides efficient data communication among a set of nodes for wireless multi-hop networks. In sensor networks and MANETs, multicast algorit...
Guo-Kai Zeng, Bo Wang 0001, Yong Ding, Li Xiao, Ma...
70
Voted
GLOBECOM
2006
IEEE
15 years 3 months ago
Rate Adaptation for Cooperative Systems
— Throughput is an important performance measure for data communications over wireless links. In this work, we consider joint adaptation of coding rates, modulation modes and lev...
Zinan Lin, Elza Erkip, Monisha Ghosh
86
Voted
ITC
2003
IEEE
177views Hardware» more  ITC 2003»
15 years 2 months ago
Analyzing the Effectiveness of Multiple-Detect Test Sets
Multiple-detect test sets have been shown to be effective in lowering defect level. Other researchers have noted that observing the effects of a defect can be controlled by sensit...
R. D. (Shawn) Blanton, Kumar N. Dwarakanath, Aniru...