Thispaper addresses theproblem in mug shot searching in suspect database. The objective is to improve the eficiency of the suspect identificationprocess. The input is a sketch con...
Abstract-- Human error in configuring routers undermines attempts to provide reliable, predictable end-to-end performance on IP networks. Manual configuration, while expensive and ...
Donald F. Caldwell, Anna Gilbert, Joel Gottlieb, A...
In this paper, we explore a hybrid global/local search optimization framework for dynamic voltage scaling in embedded multiprocessor systems. The problem is to find, for a multipr...
In this paper we describe a novel methodology for retrieving and combining information from multiple ontologies for the medical domain. In the last decades the number and diversity...
Vasco Pedro, Lucian Vlad Lita, Radu Stefan Nicules...
The starting point for collision attacks on practical hash functions is a local collision. In this paper, we make a systematic study of local collisions for the SHA-2 family. The p...