• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 728
Next 10 →

Ants: A toolkit for building and dynamically deploying network protocols

by David J. Wetherall, John V. Guttag, David L. Tennenhouse - IEEE OPENARCH 98 , 1998
"... We present a novel approach to building and deploying network protocols. The approach is based on mobile code, demand loading, and caching techniques. The architecture of our system allows new protocols to be dynamically deployed at both routers and end systems, without the need forcoordination and ..."
Abstract - Cited by 401 (5 self) - Add to MetaCart
and without unwanted interaction between co-existing protocols. In this paper, we describe our architecture and its realization in a prototype implementation. To demonstrate how to exploit our architecture, we present two simple protocols that operate within our prototype to introduce multicast and mobility

Face recognition using laplacianfaces

by Xiaofei He, Shuicheng Yan, Yuxiao Hu, Partha Niyogi, Hong-jiang Zhang - IEEE Transactions on Pattern Analysis and Machine Intelligence , 2005
"... Abstract—We propose an appearance-based face recognition method called the Laplacianface approach. By using Locality Preserving Projections (LPP), the face images are mapped into a face subspace for analysis. Different from Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) wh ..."
Abstract - Cited by 389 (38 self) - Add to MetaCart
Beltrami operator on the face manifold. In this way, the unwanted variations resulting from changes in lighting, facial expression, and pose may be eliminated or reduced. Theoretical analysis shows that PCA, LDA, and LPP can be obtained from different graph models. We compare the proposed Laplacianface

Predicting Human Interruptibility with Sensors: A Wizard of Oz Feasibility Study

by Scott E. Hudson, James Fogarty, Christopher G. Atkeson, Daniel Avrahami, Jodi Forlizzi, Sara Kiesler, Johnny C. Lee, Jie Yang - CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS , 2003
"... A person seeking someone else's attention is normally able to quickly assess how interruptible they are. This assessment allows for behavior we perceive as natural, socially appropriate, or simply polite. On the other hand, today's computer systems are almost entirely oblivious to the huma ..."
Abstract - Cited by 284 (27 self) - Add to MetaCart
to the human world they operate in, and typically have no way to take into account the interruptibility of the user. This paper presents a Wizard of Oz study exploring whether, and how, robust sensor-based predictions of interruptibility might be constructed, which sensors might be most useful

Spectra and Pseudospectra: The Behavior of Nonnormal Matrices and Operators

by Nicholas J. Higham, Lloyd N. Trefethen, Mark Embree Princeton , 2005
"... Eigenvalues, latent roots, proper values, characteristic values—four synonyms for a set of numbers that provide much useful information about a matrix or op-erator. A huge amount of research has been directed at the theory of eigenvalues (localization, perturbation, canonical forms,...), at applicat ..."
Abstract - Cited by 189 (13 self) - Add to MetaCart
Eigenvalues, latent roots, proper values, characteristic values—four synonyms for a set of numbers that provide much useful information about a matrix or op-erator. A huge amount of research has been directed at the theory of eigenvalues (localization, perturbation, canonical forms

Targeting the Unwanted. Video Surveillance and

by Heidi Mork Lomell - Categorical Exclusion in Oslo, Norway’, Surveillance and Society , 2004
"... The rise of video surveillance in the United Kingdom, in the form of the public installation of closed circuit television (CCTV), has been seen by several scholars as a contributing factor to the increasing exclusion of unwanted categories of people from city centers, a develo pment often referred t ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
The rise of video surveillance in the United Kingdom, in the form of the public installation of closed circuit television (CCTV), has been seen by several scholars as a contributing factor to the increasing exclusion of unwanted categories of people from city centers, a develo pment often referred

Unwanted Traffic in 3G Networks

by Fabio Ricciato , 2006
"... The presence of "unwanted" (or background) tra#c in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence into account might experience troubles during periods of massive exposure to unwanted traffic, e.g. during large-scale infect ..."
Abstract - Cited by 18 (5 self) - Add to MetaCart
to the widespread use of 3G connect cards for laptops. We urge the research community and network operators to consider the issue of 3G robustness to unwanted traffic as a prominent research area.

Methods for Identifying Unwanted Network Traffic

by Ismo Lehmus
"... The amount of unwanted network traffic on the Internet is constantly increasing and it seems that currently there are no methods to identify and filter out such traffic. Before a solution can be proposed, it must be understood why such problem exists. Unwanted network traffic is caused simply becaus ..."
Abstract - Add to MetaCart
The amount of unwanted network traffic on the Internet is constantly increasing and it seems that currently there are no methods to identify and filter out such traffic. Before a solution can be proposed, it must be understood why such problem exists. Unwanted network traffic is caused simply

Pollution Prevention Measures for Unwanted Pharmaceuticals Industrial Ecology

by Sandra M. Gualtero , 2005
"... 2 Studies in many countries have demonstrated the presence of pharmaceutical products at trace levels in water streams. The life cycle of a pharmaceutical product was analyzed and it was determined that the major contributor to the presence of these substances in the environment is not the manufactu ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
is not the manufacturing operations but the use and actions of the consumers. The amount of unwanted pharmaceuticals that could be disposed in toilets and trash in the US was estimated by using data from take back programs in other countries. Even though the environmental impact of pharmaceuticals in the environment

Unwanted Activity Detection System in Wireless Network

by Sneha A. Deshmukh, Monika Rajput
"... Abstract- This paper present how the security can be given to the wireless network with the help of intrusion detection system and firewalls. With the rapid growth of application of Internet in various walks of life, the study of Security has become inevitable. Wireless networks are providing tremen ..."
Abstract - Add to MetaCart
tremendous benefit for a number of industries. This paper focuses different kinds of wireless network i.e. mobile ad hoc network, wi-fi and bluetooth. Although Wireless Networks have appealing features (e.g., low installation cost, unattended network operation), due to the lack of a physical line of defense

Unwanted link layer traffic in large IEEE 802.11 wireless networks

by Ramya Raghavendra, Elizabeth M. Belding, Konstantina Papagiannaki, Kevin C. Almeroth - In Proc. of IMC , 2007
"... Abstract—Wireless networks have evolved into an important technology for connecting users to the Internet. As the utility of wireless technology grows, wireless networks are being deployed in more widely varying conditions. The monitoring of wireless networks continues to reveal key implementation d ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
deficiencies that need to be corrected in order to improve protocol operation and end-to-end network performance. In wireless networks, where the medium is shared, unwanted traffic can pose significant overhead and lead to suboptimal network performance. Much of the previous analyses of unwanted traffic
Next 10 →
Results 1 - 10 of 728
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University