Sciweavers

994 search results - page 135 / 199
» Custom Computing Machines for the Set Covering Problem
Sort
View
CONEXT
2007
ACM
15 years 4 months ago
Practical defenses against BGP prefix hijacking
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates a route to an IP prefix it does not own, is becoming an increasingly serious security p...
Zheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing M...
109
Voted
TMI
2010
143views more  TMI 2010»
14 years 7 months ago
Data Specific Spatially Varying Regularization for Multimodal Fluorescence Molecular Tomography
Fluorescence molecular tomography (FMT) allows in vivo localization and quantification of fluorescence biodistributions in whole animals. The ill-posed nature of the tomographic re...
Damon Hyde, Eric L. Miller, Dana H. Brooks, Vasili...
SDM
2011
SIAM
232views Data Mining» more  SDM 2011»
14 years 3 months ago
A Sequential Dual Method for Structural SVMs
In many real world prediction problems the output is a structured object like a sequence or a tree or a graph. Such problems range from natural language processing to computationa...
Shirish Krishnaj Shevade, Balamurugan P., S. Sunda...
112
Voted
USITS
1997
15 years 1 months ago
Lightweight Security Primitives for E-Commerce
Emerging applications in electronic commerce often involve very low-cost transactions, which execute in the context of ongoing, extended clientserver relationships. For example, c...
Yossi Matias, Alain J. Mayer, Abraham Silberschatz
FCCM
1998
IEEE
107views VLSI» more  FCCM 1998»
15 years 4 months ago
Frequency-Domain Sonar Processing in FPGAs and DSPs
Over the past year we have been exploring the use of FPGA-based custom computing machines for several sonar beamforming applications, including time-domain beamforming[1], frequen...
Paul Graham, Brent E. Nelson