Sciweavers

5153 search results - page 898 / 1031
» Introduction to Randomized Algorithms
Sort
View
98
Voted
CONEXT
2008
ACM
15 years 4 months ago
High performance traffic shaping for DDoS mitigation
Distributed Denial of Service (DDoS) attack mitigation systems usually generate a list of filter rules in order to block malicious traffic. In contrast to this binary decision we ...
Markus Goldstein, Matthias Reif, Armin Stahl, Thom...
139
Voted
DAGM
2008
Springer
15 years 4 months ago
Resolution Enhancement of PMD Range Maps
Photonic mixer device (PMD) range cameras are becoming popular as an alternative to algorithmic 3D reconstruction but their main drawbacks are low-resolution (LR) and noise. Recent...
A. N. Rajagopalan, Arnav V. Bhavsar, Frank Wallhof...
114
Voted
DAS
2008
Springer
15 years 4 months ago
Super-Resolution of Text Images Using Edge-Directed Tangent Field
This paper presents an edge-directed super-resolution algorithm for gray level document images without using any training set. This technique creates an image with smooth regions ...
Jyotirmoy Banerjee, C. V. Jawahar
159
Voted
FSE
2008
Springer
177views Cryptology» more  FSE 2008»
15 years 4 months ago
MD4 is Not One-Way
MD4 is a hash function introduced by Rivest in 1990. It is still used in some contexts, and the most commonly used hash function (MD5, SHA-1, SHA-2) are based on the design princip...
Gaëtan Leurent
136
Voted
BIOCOMP
2007
15 years 4 months ago
Quality-Based Similarity Search for Biological Sequence Databases
Low-Complexity Regions (LCRs) of biological sequences are the main source of false positives in similarity searches for biological sequence databases. We consider the problem of ï...
Xuehui Li, Tamer Kahveci