Sciweavers

14704 search results - page 2843 / 2941
» computing 2007
Sort
View
IJNSEC
2007
110views more  IJNSEC 2007»
15 years 3 months ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi
ICIP
2007
IEEE
16 years 5 months ago
An Adaptive Multiresolution Approach to Fingerprint Recognition
We propose an adaptive multiresolution (MR) approach to the classification of fingerprint images. The system adds MR decomposition in front of a generic classifier consisting of f...
Aliaksei Sandryhaila, Amina Chebira, Charles Jacks...
ICDE
2007
IEEE
148views Database» more  ICDE 2007»
16 years 4 months ago
Efficient Detection of Distributed Constraint Violations
In many distributed environments, the primary function of monitoring software is to detect anomalies, that is, instances when system behavior deviates substantially from the norm....
Shipra Agrawal, Supratim Deb, K. V. M. Naidu, Raje...
204
Voted
ICDE
2007
IEEE
114views Database» more  ICDE 2007»
16 years 4 months ago
Scalable Peer-to-Peer Web Retrieval with Highly Discriminative Keys
The suitability of Peer-to-Peer (P2P) approaches for fulltext web retrieval has recently been questioned because of the claimed unacceptable bandwidth consumption induced by retri...
Ivana Podnar, Martin Rajman, Toan Luu, Fabius Klem...
206
Voted
ICDE
2007
IEEE
175views Database» more  ICDE 2007»
16 years 4 months ago
Dynamic Batch Nearest Neighbor Search in Video Retrieval
To retrieve similar database videos to a query clip, each video is typically represented by a sequence of highdimensional feature vectors. Given a query video containing m feature...
Jie Shao, Zi Huang, Heng Tao Shen, Xiaofang Zhou, ...
« Prev « First page 2843 / 2941 Last » Next »