Sciweavers

1513 search results - page 96 / 303
» Cryptographic Pattern Matching
Sort
View
168
Voted
ICC
2009
IEEE
139views Communications» more  ICC 2009»
15 years 11 days ago
Distributed Intrusion Detection with Intelligent Network Interfaces for Future Networks
Abstract--Intrusion detection remains an important and challenging task in current and next generation networks (NGN). Emerging technologies such as multi-core processors and virtu...
Yan Luo, Ke Xiang, Jie Fan, Chunhui Zhang
137
Voted
PLILP
1998
Springer
15 years 6 months ago
A Compiler for Rewrite Programs in Associative-Commutative Theories
Abstract. We address the problem of term normalisation modulo associativecommutative (AC) theories, and describe several techniques for compiling many-to-one AC matching and reduce...
Pierre-Etienne Moreau, Hélène Kirchn...
118
Voted
JIIS
2011
99views more  JIIS 2011»
14 years 9 months ago
Mining transposed motifs in music
The discovery of frequent musical patterns (motifs) is a relevant problem in musicology. This paper introduces an unsupervised algorithm to address this problem in symbolically-rep...
Aída Jiménez, Miguel Molina-Solana, ...
95
Voted
ECCV
2008
Springer
16 years 4 months ago
Regularized Partial Matching of Rigid Shapes
Abstract. Matching of rigid shapes is an important problem in numerous applications across the boundary of computer vision, pattern recognition and computer graphics communities. A...
Alexander M. Bronstein, Michael M. Bronstein
105
Voted
ICPR
2006
IEEE
16 years 3 months ago
Fingerprint Matching Method Using Minutiae Clustering and Warping
Solving non-linear distortion problems in fingerprint matching is important and still remains as a challenging topic. We have developed a new fingerprint matching method to deal w...
Dongjin Kwon, Duck Hoon Kim, Il Dong Yun, Sang Uk ...