Sciweavers

4072 search results - page 705 / 815
» Designing an Optimal Network Using the Cross-Entropy Method
Sort
View
TPDS
2008
140views more  TPDS 2008»
14 years 11 months ago
High-Performance Resource Allocation and Request Redirection Algorithms for Web Clusters
Abstract-- With increasing richness in features such as personalization of content, web applications are becoming more complex and hence compute intensive. Traditional approaches t...
Supranamaya Ranjan, Edward W. Knightly
IH
2007
Springer
15 years 5 months ago
Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries
In this paper, we describe a new forensic tool for revealing digitally altered images by detecting the presence of photo-response non-uniformity noise (PRNU) in small regions. This...
Mo Chen, Jessica J. Fridrich, Jan Lukás, Mi...
AAI
2006
215views more  AAI 2006»
14 years 11 months ago
Extensive Evaluation of Efficient NLP-Driven Text Classification
Extensive experimental evidence is required to study the impact of text categorization approaches on real data and to assess the performance within operational scenarios. In this ...
Roberto Basili, Alessandro Moschitti, Maria Teresa...
PAMI
1998
141views more  PAMI 1998»
14 years 11 months ago
A Probabilistic Approach to the Coupled Reconstruction and Restoration of Underwater Acoustic Images
—This paper describes a probabilistic technique for the coupled reconstruction and restoration of underwater acoustic images. The technique is founded on the physics of the image...
Vittorio Murino, Andrea Trucco, Carlo S. Regazzoni
ARCS
2004
Springer
15 years 4 months ago
Cryptonite - A Programmable Crypto Processor Architecture for High-Bandwidth Applications
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
Rainer Buchty, Nevin Heintze, Dino Oliva