Measurement of software security is a long-standing challenge to the research community. At the same time, practical security metrics and measurements are essential for secure software development. Hence, the need for metrics is more pressing now due to a growing demand for secure software. In this paper, we propose using a software system’s attack surface […]
Practical Bounds on Image Denoising: From Estimation to Information
Recently, in a previous work, we proposed a way to bound how well any given image can be denoised. The bound was computed directly from the noise-free image that was assumed to be available. In this work, we extend the formulation to the more practical case where no ground truth is available. We show that […]
Active Learning for Solving the Incomplete Data Problem in Facial Age Classification by the Furthest Nearest-Neighbor Criterion – Java – .Net – 2011 – Trichy – Chennai
Facial age classification is an approach to classify face images into one of several predefined age groups. One of the difficulties in applying learning techniques to the age classification problem is the large amount of labeled training data required. Acquiring such training data is very costly in terms of age progress, privacy, human time, and […]
High-Quality Reflection Separation Using Polarized Images
In this paper, we deal with a problem of separating the effect of reflection from images captured behind glass. The input consists of multiple polarized images captured from the same view point but with different polarizer angles. The output is the high quality separation of the reflection layer and the background layer from the images. […]
Throughput lifetime trade offs in multi-hop wireless networks under an sinr based interference model
High throughput and lifetime are both crucial design objectives for a number of multihop wireless network applications. As these two objectives are often in conflict with each other, it naturally becomes important to identify the trade-offs between them. Several works in the literature have focused on improving one or the other, but investigating the trade-off […]
Message-Efficient Location Prediction for Mobile Objects in Wireless Sensor Networks Using a Maximum Likelihood Technique
In the tracking system, a better prediction model can significantly reduce power consumption in a wireless sensor network because fewer redundant sensors will be activated to keep monitoring the object. The Gauss-Markov mobility model is one of the best mobility models to describe object trajectory because it can capture the correlation of object velocity in […]
Detection of selfish manipulation of carrier sensing in 802.11 networks
Recently, tuning the clear channel assessment (CCA) threshold in conjunction with power control has been considered for improving the performance of WLANs. However, we show that, CCA tuning can be exploited by selfish nodes to obtain an unfair share of the available bandwidth. Specifically, a selfish entity can manipulate the CCA threshold to ignore ongoing […]
Multipath Routing and Max-Min Fair QoS Provisioning under Interference Constraints in Wireless Multihop Networks
In this paper, we investigate the problem of flow routing and fair bandwidth allocation under interference constraints for multihop wireless networks. We first develop a novel isotonic routing metric, RI3M, considering the influence of interflow and intraflow interference. The isotonicity of the routing metric is proved using virtual network decomposition. Second, in order to ensure […]
Dynamic Conflict-Free Transmission Scheduling for Sensor Network Queries
With the emergence of high data rate sensor network applications, there is an increasing demand for high-performance query services. To meet this challenge, we propose Dynamic Conflict-free Query Scheduling (DCQS), a novel scheduling technique for queries in wireless sensor networks. In contrast to earlier TDMA protocols designed for general-purpose workloads, DCQS is specifically designed for […]
Design and performance analysis of mobility management schemes based on pointer forwarding for wireless mesh networks
We propose efficient mobility management schemes based on pointer forwarding for wireless mesh networks (WMNs) with the objective to reduce the overall network traffic incurred by mobility management and packet delivery. The proposed schemes are per-user-based, i.e., the optimal threshold of the forwarding chain length that minimizes the overall network traffic is dynamically determined for […]
- « Previous Page
- 1
- …
- 89
- 90
- 91
- 92
- 93
- …
- 108
- Next Page »