Sciweavers

1518 search results - page 270 / 304
» Cryptographic Test Correction
Sort
View
EUROSYS
2008
ACM
16 years 27 days ago
Documenting and automating collateral evolutions in linux device drivers
The internal libraries of Linux are evolving rapidly, to address new requirements and improve performance. These evolutions, however, entail a massive problem of collateral evolut...
Yoann Padioleau, Julia L. Lawall, René Rydh...
FOCS
2009
IEEE
15 years 10 months ago
Agnostic Learning of Monomials by Halfspaces Is Hard
— We prove the following strong hardness result for learning: Given a distribution on labeled examples from the hypercube such that there exists a monomial (or conjunction) consi...
Vitaly Feldman, Venkatesan Guruswami, Prasad Ragha...
ICASSP
2009
IEEE
15 years 10 months ago
Data hiding in hard-copy text documents robust to print, scan and photocopy operations
This paper describes a method for hiding data inside printed text documents that is resilient to print/scan and photocopying operations. Using the principle of channel coding with...
Avinash L. Varna, Shantanu Rane, Anthony Vetro
142
Voted
ICDM
2009
IEEE
125views Data Mining» more  ICDM 2009»
15 years 10 months ago
A Fully Automated Method for Discovering Community Structures in High Dimensional Data
—Identifying modules, or natural communities, in large complex networks is fundamental in many fields, including social sciences, biological sciences and engineering. Recently s...
Jianhua Ruan
ICIG
2009
IEEE
15 years 10 months ago
Image Segmentation Via Iterative Geodesic Averaging
We present a simple and fast method for performing unsupervised segmentation. Our method works by centering a square window on each pixel of the input image. Each pixel is then as...
Asmaa Hosni, Michael Bleyer, Margrit Gelautz