Sciweavers

2059 search results - page 398 / 412
» A Directed Threshold - Signature Scheme
Sort
View
IPAS
2008
15 years 6 days ago
Multivariate mathematical morphology and Bayesian classifier application to colour and medical images
Multivariate images are now commonly produced in many applications. If their process is possible due to computers power and new programming languages, theoretical difficulties hav...
Arnaud Garcia, Corinne Vachier, Jean-Paul Vall&eac...
82
Voted
USENIX
2007
15 years 4 days ago
DiskSeen: Exploiting Disk Layout and Access History to Enhance I/O Prefetch
Current disk prefetch policies in major operating systems track access patterns at the level of the file abstraction. While this is useful for exploiting application-level access...
Xiaoning Ding, Song Jiang, Feng Chen, Kei Davis, X...
USS
2008
15 years 4 days ago
Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks
Large-scale bandwidth-based distributed denial-of-service (DDoS) attacks can quickly knock out substantial parts of a network before reactive defenses can respond. Even traffic flo...
Jerry Chi-Yuan Chou, Bill Lin, Subhabrata Sen, Oli...
CCS
2008
ACM
14 years 11 months ago
Robust content-driven reputation
In content-driven reputation systems for collaborative content, users gain or lose reputation according to how their contributions fare: authors of long-lived contributions gain r...
Krishnendu Chatterjee, Luca de Alfaro, Ian Pye
FITRAMEN
2008
14 years 11 months ago
High-Performance H.264/SVC Video Communications in 802.11e Ad Hoc Networks
This work focuses on improving the performance of video communications based on the recently developed H.264 Scalable Video Coding (SVC) standard over 802.11e wireless networks. Th...
Attilio Fiandrotti, Dario Gallucci, Enrico Masala,...