Sciweavers

9316 search results - page 179 / 1864
» Analysis of traceback techniques
Sort
View
CVPR
2012
IEEE
13 years 6 months ago
Mode-seeking on graphs via random walks
Mode-seeking has been widely used as a powerful data analysis technique for clustering and filtering in a metric feature space. We introduce a versatile and efficient modeseekin...
Minsu Cho, Kyoung Mu Lee
ARC
2009
Springer
137views Hardware» more  ARC 2009»
15 years 11 months ago
Heterogeneous Architecture Exploration: Analysis vs. Parameter Sweep
This paper argues the case for the use of analytical models in FPGA architecture layout exploration. We show that the problem when simplified, is amenable to formal optimization t...
Asma Kahoul, George A. Constantinides, Alastair M....
AIMS
2008
Springer
15 years 10 months ago
Dynamic Consistency Analysis for Convergent Operators
It has been shown that sets of convergent operators with a shared fixed point can simulate autonomic control mechanisms, but many questions remain about this management technique....
Alva L. Couch, Marc Chiarini
121
Voted
ICWE
2004
Springer
15 years 9 months ago
Semantic Analysis of a Web Site: a Prototype
Many works has been made to improve the users browsing on Web sites notably with the adaptation techniques which allow to guide the users according to their profile in order to di...
Michel Sala, Gaël Isoird
FSE
2006
Springer
111views Cryptology» more  FSE 2006»
15 years 7 months ago
Analysis of Step-Reduced SHA-256
This is the first article analyzing the security of SHA-256 against fast collision search which considers the recent attacks by Wang et al. We show the limits of applying technique...
Florian Mendel, Norbert Pramstaller, Christian Rec...