Sciweavers

817 search results - page 130 / 164
» On 2-factors with k components
Sort
View
IPPS
2010
IEEE
14 years 7 months ago
Head-body partitioned string matching for Deep Packet Inspection with scalable and attack-resilient performance
Abstract--Dictionary-based string matching (DBSM) is a critical component of Deep Packet Inspection (DPI), where thousands of malicious patterns are matched against high-bandwidth ...
Yi-Hua E. Yang, Viktor K. Prasanna, Chenqian Jiang
DAC
2009
ACM
14 years 7 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
IJAMCIGI
2010
90views more  IJAMCIGI 2010»
14 years 7 months ago
A Reinforcement Learning - Great-Deluge Hyper-Heuristic for Examination Timetabling
Hyper-heuristics are identified as the methodologies that search the space generated by a finite set of low level heuristics for solving difficult problems. One of the iterative h...
Ender Özcan, Mustafa Misir, Gabriela Ochoa, E...
CORR
2010
Springer
198views Education» more  CORR 2010»
14 years 6 months ago
Convex Graph Invariants
The structural properties of graphs are usually characterized in terms of invariants, which are functions of graphs that do not depend on the labeling of the nodes. In this paper ...
Venkat Chandrasekaran, Pablo A. Parrilo, Alan S. W...
CVPR
2011
IEEE
14 years 5 months ago
Learning Temporally Consistent Rigidities
We present a novel probabilistic framework for rigid tracking and segmentation of shapes observed from multiple cameras. Most existing methods have focused on solving each of thes...
Jean-Sebastien Franco, Edmond Boyer