Sciweavers

24529 search results - page 474 / 4906
» Computing on Authenticated Data
Sort
View
IJISEC
2006
119views more  IJISEC 2006»
15 years 5 months ago
A monitoring system for detecting repeated packets with applications to computer worms
Abstract We present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses Bloom filters with count...
Paul C. van Oorschot, Jean-Marc Robert, Miguel Var...
126
Voted
JPDC
2008
129views more  JPDC 2008»
15 years 5 months ago
A framework for scalable greedy coloring on distributed-memory parallel computers
We present a scalable framework for parallelizing greedy graph coloring algorithms on distributed-memory computers. The framework unifies several existing algorithms and blends a ...
Doruk Bozdag, Assefaw Hadish Gebremedhin, Fredrik ...
IJCV
2000
133views more  IJCV 2000»
15 years 4 months ago
Heteroscedastic Regression in Computer Vision: Problems with Bilinear Constraint
We present an algorithm to estimate the parameters of a linear model in the presence of heteroscedastic noise, i.e., each data point having a different covariance matrix. The algor...
Yoram Leedan, Peter Meer
136
Voted
SIGCSE
2002
ACM
118views Education» more  SIGCSE 2002»
15 years 4 months ago
A proposed undergraduate bioinformatics curriculum for computer scientists
Bioinformatics is a new and rapidly evolving discipline that has emerged from the fields of experimental molecular biology and biochemistry, and from the the artificial intelligen...
Travis E. Doom, Michael L. Raymer, Dan E. Krane, O...
167
Voted
SISAP
2010
IEEE
243views Data Mining» more  SISAP 2010»
15 years 2 months ago
Similarity matrix compression for efficient signature quadratic form distance computation
Determining similarities among multimedia objects is a fundamental task in many content-based retrieval, analysis, mining, and exploration applications. Among state-of-the-art sim...
Christian Beecks, Merih Seran Uysal, Thomas Seidl