Sciweavers

4166 search results - page 700 / 834
» Automating the constraining process
Sort
View
113
Voted
ACNS
2004
Springer
77views Cryptology» more  ACNS 2004»
15 years 9 months ago
A Pay-per-Use DoS Protection Mechanism for the Web
Internet service providers have resisted deploying Denial-of-Service (DoS) protection mechanisms despite numerous research results in the area. This is so primarily because ISPs ca...
Angelos Stavrou, John Ioannidis, Angelos D. Keromy...
151
Voted
AUSAI
2004
Springer
15 years 9 months ago
BayesTH-MCRDR Algorithm for Automatic Classification of Web Document
Nowadays, automated Web document classification is considered as an important method to manage and process an enormous amount of Web documents in digital forms that are extensive a...
Woo-Chul Cho, Debbie Richards
CHES
2004
Springer
121views Cryptology» more  CHES 2004»
15 years 9 months ago
Improving the Security of Dual-Rail Circuits
Dual-rail encoding, return-to-spacer protocol and hazard-free logic can be used to resist differential power analysis attacks by making the power consumption independent of process...
Danil Sokolov, Julian Murphy, Alexandre V. Bystrov...
122
Voted
CIVR
2004
Springer
200views Image Analysis» more  CIVR 2004»
15 years 9 months ago
HMM Model Selection Issues for Soccer Video
There has been a concerted effort from the Video Retrieval community to develop tools that automate the annotation process of Sports video. In this paper, we provide an in-depth i...
Mark Baillie, Joemon M. Jose, Cornelis Joost van R...
125
Voted
ECAI
2004
Springer
15 years 9 months ago
Symmetry Breaking as a Prelude to Implied Constraints: A Constraint Modelling Pattern
Finite-domain constraint programming can be used to solve a wide range of problems by first modelling the problem as a set of constraints that characterise the problem’s solutio...
Alan M. Frisch, Christopher Jefferson, Ian Miguel