Sciweavers

661 search results - page 86 / 133
» Robustness Guarantees for Anonymity
Sort
View
97
Voted
COMPUTER
2000
102views more  COMPUTER 2000»
15 years 19 days ago
The Next-Generation Internet: Unsafe at Any Speed?
Abstract--An emerging generation of mission-critical networked applications is placing demands on the Internet protocol suite that go well beyond the properties they were designed ...
Kenneth P. Birman
95
Voted
ICMS
2010
14 years 11 months ago
TADD: A Computational Framework for Data Analysis Using Discrete Morse Theory
This paper presents a computational framework that allows for a robust extraction of the extremal structure of scalar and vector fields on 2D manifolds embedded in 3D. This struct...
Jan Reininghaus, David Günther, Ingrid Hotz, ...
138
Voted
TCS
2010
14 years 11 months ago
Computing the graph-based parallel complexity of gene assembly
We consider a graph-theoretical formalization of the process of gene assembly in ciliates introduced in Ehrenfeucht et al (2003), where a gene is modeled as a signed graph. The ge...
Artiom Alhazov, Chang Li, Ion Petre
ACIIDS
2009
IEEE
160views Database» more  ACIIDS 2009»
14 years 10 months ago
Stability Analysis of Time-Delay Fuzzy Systems Using Fuzzy Lyapunov Method
This study presents an H controller design for time-delay Takagi-Sugeno (T-S) fuzzy systems based on the fuzzy Lyapunov method, which is defined in terms of fuzzy blending quadrati...
Ken Yeh, Cheng-Wu Chen, Shu-Hao Lin, Chen-Yuan Che...
114
Voted
ICDAR
2009
IEEE
14 years 10 months ago
Graph b-Coloring for Automatic Recognition of Documents
In order to reduce the rejection rate of our automatic reading system, we propose to pre-classify the business documents by introducing an Automatic Recognition of Documents stage...
Djamel Gaceb, Véronique Eglin, Frank Lebour...