Sciweavers

3116 search results - page 561 / 624
» Recovering
Sort
View
144
Voted
MMMACNS
2005
Springer
15 years 10 months ago
A Passive External Web Surveillance Technique for Private Networks
The variety and richness of what users browse on the Internet has made the communications of web-browsing hosts an attractive target for surveillance. We show that passive external...
Constantine Daicos, Scott Knight
137
Voted
PKC
2005
Springer
167views Cryptology» more  PKC 2005»
15 years 10 months ago
Converse Results to the Wiener Attack on RSA
A well-known attack on RSA with low secret-exponent d was given by Wiener about 15 years ago. Wiener showed that using continued fractions, one can efficiently recover the secret-...
Ron Steinfeld, Scott Contini, Huaxiong Wang, Josef...
VLSM
2005
Springer
15 years 10 months ago
Incorporating Rigid Structures in Non-rigid Registration Using Triangular B-Splines
For non-rigid registration, the objects in medical images are usually treated as a single deformable body with homogeneous stiffness distribution. However, this assumption is inval...
Kexiang Wang, Ying He 0001, Hong Qin
134
Voted
APGV
2004
ACM
164views Visualization» more  APGV 2004»
15 years 10 months ago
Subband encoding of high dynamic range imagery
The transition from traditional 24-bit RGB to high dynamic range (HDR) images is hindered by excessively large file formats with no backwards compatibility. In this paper, we prop...
Greg Ward, Maryann Simmons
SIGCOMM
2004
ACM
15 years 10 months ago
An algebraic approach to practical and scalable overlay network monitoring
Overlay network monitoring enables distributed Internet applications to detect and recover from path outages and periods of degraded performance within seconds. For an overlay net...
Yan Chen, David Bindel, Han Hee Song, Randy H. Kat...