Sciweavers

54 search results - page 11 / 11
» A framework for numeric analysis of array operations
Sort
View
TWC
2008
154views more  TWC 2008»
13 years 5 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
SIAMJO
2010
246views more  SIAMJO 2010»
13 years 3 months ago
A Singular Value Thresholding Algorithm for Matrix Completion
This paper introduces a novel algorithm to approximate the matrix with minimum nuclear norm among all matrices obeying a set of convex constraints. This problem may be understood a...
Jian-Feng Cai, Emmanuel J. Candès, Zuowei S...
VEE
2012
ACM
252views Virtualization» more  VEE 2012»
12 years 28 days ago
libdft: practical dynamic data flow tracking for commodity systems
Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they propagate during program execution. DFT has been repeatedly implemented by a variety of ...
Vasileios P. Kemerlis, Georgios Portokalidis, Kang...
SMI
2005
IEEE
111views Image Analysis» more  SMI 2005»
13 years 11 months ago
Rational Spherical Splines for Genus Zero Shape Modeling
Traditional approaches for modeling a closed manifold surface with either regular tensor-product or triangular splines (defined over an open planar domain) require decomposing th...
Ying He 0001, Xianfeng Gu, Hong Qin