Sciweavers

128 search results - page 20 / 26
» A Simple Implementation Technique for Priority Search Queues
Sort
View
ICPP
2007
IEEE
15 years 6 months ago
Defending P2Ps from Overlay Flooding-based DDoS
A flooding-based search mechanism is often used in unstructured P2P systems. Although a flooding-based search mechanism is simple and easy to implement, it is vulnerable to overla...
Yunhao Liu, Xiaomei Liu, Chen Wang, Li Xiao
105
Voted
PCM
2004
Springer
106views Multimedia» more  PCM 2004»
15 years 5 months ago
Performance Improvement of Vector Quantization by Using Threshold
Abstract. Vector quantization (VQ) is an elementary technique for image compression. However, the complexity of searching the nearest codeword in a codebook is time-consuming. In t...
Hung-Yi Chang, Pi-Chung Wang, Rong-Chang Chen, Shu...
103
Voted
NDSS
2008
IEEE
15 years 6 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
WWW
2006
ACM
16 years 10 days ago
POLYPHONET: an advanced social network extraction system from the web
Social networks play important roles in the Semantic Web: knowledge management, information retrieval, ubiquitous computing, and so on. We propose a social network extraction syst...
Hideaki Takeda, Junichiro Mori, Kôiti Hasida...
ICCAD
1997
IEEE
121views Hardware» more  ICCAD 1997»
15 years 3 months ago
Adaptive methods for netlist partitioning
An algorithm that remains in use at the core of many partitioning systems is the Kernighan-Lin algorithm and a variant the Fidducia-Matheysses (FM) algorithm. To understand the FM...
Wray L. Buntine, Lixin Su, A. Richard Newton, Andr...