This paper proposes a stream authentication method based on the Generalized Butterfly Graph (GBG) framework. Compared with the original Butterfly graph, the proposed GBG graph sup...
Zhishou Zhang, John G. Apostolopoulos, Qibin Sun, ...
Boundary detection in MR image with brain tumor is an important image processiug technique applied in Radiology for 3D reconstruction. The nonhomogeneities density tissue of the br...
C. C. Leung, W. F. Chen, Paul C. K. Kwok, Francis ...
In this paper, we are concerned with the distributed monitoring of P2P systems. We introduce the P2P Monitor system and a new declarative language, namely P2PML, for specifying mo...
In this paper we address the problem of organizing hidden-Web databases. Given a heterogeneous set of Web forms that serve as entry points to hidden-Web databases, our goal is to ...
The emergence of electronic marketplaces and other electronic services and applications on the Internet is creating a growing demand for effective management of resources. Due to ...
Markus Keidl, Alexander Kreutz, Alfons Kemper, Don...