Sciweavers

198 search results - page 18 / 40
» Computing the Algebraic Immunity Efficiently
Sort
View
PDP
2009
IEEE
15 years 6 months ago
BitTorrent Worm Sensor Network : P2P Worms Detection and Containment
- Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting th...
Sinan Hatahet, Yacine Challal, Abdelmadjid Bouabda...
IJNSEC
2006
110views more  IJNSEC 2006»
14 years 11 months ago
Password-based Encrypted Group Key Agreement
This paper presents an efficient password-based authenticated encrypted group key agreement protocol immune to dictionary attack under the computation Diffie-Hellman (CDH) assumpt...
Ratna Dutta, Rana Barua
TVCG
2008
70views more  TVCG 2008»
14 years 11 months ago
Visualizing Incomplete and Partially Ranked Data
Ranking data, which result from m raters ranking n items, are difficult to visualize due to their discrete algebraic structure, and the computational difficulties associated with t...
Paul Kidwell, Guy Lebanon, William S. Cleveland
ACCV
2007
Springer
15 years 3 months ago
Efficiently Solving the Fractional Trust Region Problem
Normalized Cuts has successfully been applied to a wide range of tasks in computer vision, it is indisputably one of the most popular segmentation algorithms in use today. A number...
Anders P. Eriksson, Carl Olsson, Fredrik Kahl
VLSID
2005
IEEE
157views VLSI» more  VLSID 2005»
16 years 2 days ago
Energy Efficient Hardware Synthesis of Polynomial Expressions
Polynomial expressions are used to approximate a wide variety of functions commonly found in signal processing and computer graphics applications. Computing these polynomial expre...
Anup Hosangadi, Farzan Fallah, Ryan Kastner