Sciweavers

3428 search results - page 114 / 686
» Making the Case
Sort
View
ICIP
1994
IEEE
16 years 8 days ago
Fractal-Based Techniques for a Generalized Image Coding Method
This paper presents a new generalized image block coding algorithm which covers fractal techniques, block transform techniques, and vector quantization as its special cases. The c...
Mohammad Gharavi-Alkhansari, Thomas S. Huang
ICDE
2001
IEEE
143views Database» more  ICDE 2001»
16 years 6 days ago
Exactly-once Semantics in a Replicated Messaging System
A distributed message delivery system can use replication to improve performance and availability. However, without safeguards, replicated messages may be delivered to a mobile de...
Yongqiang Huang, Hector Garcia-Molina
HICSS
2007
IEEE
135views Biometrics» more  HICSS 2007»
15 years 5 months ago
Extending the Applicability of Recommender Systems: A Multilayer Framework for Matching Human Resources
Recommender Systems (RS) so far have been applied to many fields of e-commerce in order to assist users in finding the products that best meet their preferences. However, while th...
Tobias Keim
IH
2007
Springer
15 years 5 months ago
A Graph Game Model for Software Tamper Protection
We present a probabilistic program-transformation algorithm to render a given program tamper-resistant. In addition, we suggest a model to estimate the required effort for an atta...
Nenad Dedic, Mariusz H. Jakubowski, Ramarathnam Ve...
SACRYPT
2007
Springer
151views Cryptology» more  SACRYPT 2007»
15 years 5 months ago
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search
The diversity of methods for fast collision search in SHA-1 and similar hash functions makes a comparison of them difficult. The literature is at times very vague on this issue, wh...
Christophe De Cannière, Florian Mendel, Chr...