Sciweavers

2468 search results - page 477 / 494
» A New Approach to Pseudoword Generation
Sort
View
CVPR
2010
IEEE
15 years 5 months ago
Stratified Learning of Local Anatomical Context for Lung Nodules in CT Images
The automatic detection of lung nodules attached to other pulmonary structures is a useful yet challenging task in lung CAD systems. In this paper, we propose a stratified statist...
Dijia Wu, Le Lu, Jinbo Bi, Yoshihisa Shinagawa, Ki...
CCS
2007
ACM
15 years 5 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
CTRSA
2009
Springer
141views Cryptology» more  CTRSA 2009»
15 years 5 months ago
Practical Short Signature Batch Verification
In many applications, it is desirable to work with signatures that are both short, and yet where many messages from different signers be verified very quickly. RSA signatures sati...
Anna Lisa Ferrara, Matthew Green, Susan Hohenberge...
150
Voted
DATE
2009
IEEE
155views Hardware» more  DATE 2009»
15 years 5 months ago
Automatically mapping applications to a self-reconfiguring platform
The inherent reconfigurability of SRAM-based FPGAs enables the use of configurations optimized for the problem at hand. Optimized configurations are smaller and faster than their g...
Karel Bruneel, Fatma Abouelella, Dirk Stroobandt
DEXA
2009
Springer
153views Database» more  DEXA 2009»
15 years 5 months ago
Three Approximation Algorithms for Energy-Efficient Query Dissemination in Sensor Database System
Abstract. Sensor database is a type of database management system which offers sensor data and stored data in its data model and query languages. In this system, when a user poses ...
Zhao Zhang, Xiaofeng Gao, Xuefei Zhang, Weili Wu, ...