Sciweavers

3428 search results - page 114 / 686
» Making the Case
Sort
View
ICIP
1994
IEEE
16 years 5 months ago
Fractal-Based Techniques for a Generalized Image Coding Method
This paper presents a new generalized image block coding algorithm which covers fractal techniques, block transform techniques, and vector quantization as its special cases. The c...
Mohammad Gharavi-Alkhansari, Thomas S. Huang
ICDE
2001
IEEE
143views Database» more  ICDE 2001»
16 years 5 months ago
Exactly-once Semantics in a Replicated Messaging System
A distributed message delivery system can use replication to improve performance and availability. However, without safeguards, replicated messages may be delivered to a mobile de...
Yongqiang Huang, Hector Garcia-Molina
139
Voted
HICSS
2007
IEEE
135views Biometrics» more  HICSS 2007»
15 years 10 months ago
Extending the Applicability of Recommender Systems: A Multilayer Framework for Matching Human Resources
Recommender Systems (RS) so far have been applied to many fields of e-commerce in order to assist users in finding the products that best meet their preferences. However, while th...
Tobias Keim
IH
2007
Springer
15 years 10 months ago
A Graph Game Model for Software Tamper Protection
We present a probabilistic program-transformation algorithm to render a given program tamper-resistant. In addition, we suggest a model to estimate the required effort for an atta...
Nenad Dedic, Mariusz H. Jakubowski, Ramarathnam Ve...
SACRYPT
2007
Springer
151views Cryptology» more  SACRYPT 2007»
15 years 10 months ago
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search
The diversity of methods for fast collision search in SHA-1 and similar hash functions makes a comparison of them difficult. The literature is at times very vague on this issue, wh...
Christophe De Cannière, Florian Mendel, Chr...