Sciweavers

319 search results - page 50 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
3DPVT
2006
IEEE
155views Visualization» more  3DPVT 2006»
15 years 3 months ago
The Reverse Projection Correlation Principle for Depth from Defocus
In this paper, we address the problem of finding depth from defocus in a fundamentally new way. Most previous methods have used an approximate model in which blurring is shift in...
Scott McCloskey, Michael S. Langer, Kaleem Siddiqi
ACSAC
2005
IEEE
15 years 3 months ago
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers
An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are gr...
Weidong Cui, Randy H. Katz, Wai-tian Tan
ISAAC
2004
Springer
107views Algorithms» more  ISAAC 2004»
15 years 3 months ago
On the Hardness and Easiness of Random 4-SAT Formulas
Assuming 3-SAT formulas are hard to refute with high probability, Feige showed approximation hardness results, among others for the max bipartite clique. We extend this result in t...
Andreas Goerdt, André Lanka
WEA
2004
Springer
124views Algorithms» more  WEA 2004»
15 years 3 months ago
Experimental Studies of Symbolic Shortest-Path Algorithms
Abstract. Graphs can be represented symbolically by the Ordered Binary Decision Diagram (OBDD) of their characteristic function. To solve problems in such implicitly given graphs, ...
Daniel Sawitzki
83
Voted
INFOCOM
2003
IEEE
15 years 2 months ago
Local Scheduling Policies in Networks of Packet Switches with Input Queues
— A significant research effort has been devoted in recent years to the design of simple and efficient scheduling policies for Input Queued (IQ) and Combined Input Output Queue...
Marco Ajmone Marsan, Paolo Giaccone, Emilio Leonar...