Sciweavers

7106 search results - page 279 / 1422
» Restricted Complexity, General Complexity
Sort
View
PVLDB
2010
125views more  PVLDB 2010»
15 years 3 months ago
The Impact of Virtual Views on Containment
Virtual views are a mechanism that facilitates re-use and makes queries easier to express. However the use of iterative view definitions makes very simple query evaluation and an...
Michael Benedikt, Georg Gottlob
129
Voted
ICC
2009
IEEE
113views Communications» more  ICC 2009»
15 years 2 months ago
Using GMM and SVM-Based Techniques for the Classification of SSH-Encrypted Traffic
When employing cryptographic tunnels such as the ones provided by Secure Shell (SSH) to protect their privacy on the Internet, users expect two forms of protection. First, they aim...
Maurizio Dusi, Alice Este, Francesco Gringoli, Luc...
ICDAR
2009
IEEE
15 years 2 months ago
Clutter Noise Removal in Binary Document Images
The paper presents a clutter detection and removal algorithm for complex document images. The distance transform based approach is independent of clutter's position, size, sh...
Mudit Agrawal, David S. Doermann
MST
2011
207views Hardware» more  MST 2011»
14 years 11 months ago
Fixpoint Logics over Hierarchical Structures
Hierarchical graph definitions allow a modular description of graphs using modules for the specification of repeated substructures. Beside this modularity, hierarchical graph de...
Stefan Göller, Markus Lohrey
148
Voted
TWC
2010
14 years 11 months ago
Fast algorithms for joint power control and scheduling in wireless networks
This paper studies the problem of finding a minimum-length schedule of a power-controlled wireless network subject to traffic demands and SINR (signal-to-interferenceplus-noise rat...
Liqun Fu, Soung Chang Liew, Jianwei Huang