Sciweavers

1615 search results - page 210 / 323
» Distributed Forward Checking
Sort
View
144
Voted
SLS
2007
Springer
117views Algorithms» more  SLS 2007»
15 years 8 months ago
An Algorithm Portfolio for the Sub-graph Isomorphism Problem
Abstract. This work presents an algorithm for the sub-graph isomorphism problem based on a new pruning technique for directed graphs. During the tree search, the method checks if a...
Roberto Battiti, Franco Mascia
118
Voted
TLCA
2007
Springer
15 years 8 months ago
Two Session Typing Systems for Higher-Order Mobile Processes
Abstract. This paper proposes two typing systems for session interactions in higherorder mobile processes. Session types for the HOπ-calculus capture high-level structures nicatio...
Dimitris Mostrous, Nobuko Yoshida
ICDCSW
2005
IEEE
15 years 8 months ago
MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks
— In this paper, we propose a new approach called MAFIC (MAlicious Flow Identification and Cutoff) to support adaptive packet dropping to fend off DDoS attacks. MAFIC works by j...
Yu Chen, Yu-Kwong Kwok, Kai Hwang
101
Voted
ICDCSW
2005
IEEE
15 years 8 months ago
Visual Code Widgets for Marker-Based Interaction
We present a set of graphical user interface elements, called widgets, for 2-dimensional visual codes. The proposed widgets are suitable for printing on paper as well as showing o...
Michael Rohs
ICPADS
2005
IEEE
15 years 8 months ago
Automated Discovery of Brand Piracy on the Internet
The Internet has become a key instrument for establishing and promoting product brands. Companies are very interested in detecting any misuse of their logos, plagiarism, grey impo...
Ulrich Pinsdorf, Peter Ebinger