Sciweavers

9849 search results - page 1863 / 1970
» Algorithms and Experiments for the Webgraph
Sort
View
SP
2008
IEEE
112views Security Privacy» more  SP 2008»
15 years 10 months ago
XFA: Faster Signature Matching with Extended Automata
Automata-based representations and related algorithms have been applied to address several problems in information security, and often the automata had to be augmented with additi...
Randy Smith, Cristian Estan, Somesh Jha
3DIM
2007
IEEE
15 years 10 months ago
Robust 2D-3D alignment based on geometrical consistency
This paper presents a new registration algorithm of a 2D image and a 3D geometrical model, which is robust for initial registration errors, for reconstructing a realistic 3D model...
Kenji Hara, Yuuki Kabashima, Yumi Iwashita, Ryo Ku...
ICC
2007
IEEE
171views Communications» more  ICC 2007»
15 years 10 months ago
Progressive Route Calculation Protocol for Wireless Mesh Networks
—Although network-wide flooding in reactive routing protocols like AODV [1] facilitates the discovery of optimal routes, they engender large control overhead. Some efficient floo...
Xuhui Hu, Myung J. Lee, Tarek N. Saadawi
ICCV
2007
IEEE
15 years 10 months ago
Fast Automatic Heart Chamber Segmentation from 3D CT Data Using Marginal Space Learning and Steerable Features
Multi-chamber heart segmentation is a prerequisite for global quantification of the cardiac function. The complexity of cardiac anatomy, poor contrast, noise or motion artifacts ...
Yefeng Zheng, Adrian Barbu, Bogdan Georgescu, Mich...
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
15 years 10 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
« Prev « First page 1863 / 1970 Last » Next »