Sciweavers

10412 search results - page 1885 / 2083
» The efficiency of algorithms - misconceptions
Sort
View
TCIAIG
2010
14 years 11 months ago
The Parametrized Probabilistic Finite-State Transducer Probe Game Player Fingerprint Model
Abstract--Fingerprinting operators generate functional signatures of game players and are useful for their automated analysis independent of representation or encoding. The theory ...
Jeffrey Tsang
TDP
2010
189views more  TDP 2010»
14 years 11 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...
TDSC
2010
172views more  TDSC 2010»
14 years 11 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...
TIP
2010
115views more  TIP 2010»
14 years 11 months ago
Constrained and Dimensionality-Independent Path Openings
Abstract--Path openings and closings are morphological operations with flexible line segments as structuring elements. These line segments have the ability to adapt to local image ...
Cris L. Luengo Hendriks
TIT
2010
124views Education» more  TIT 2010»
14 years 11 months ago
Storage coding for wear leveling in flash memories
NAND flash memories are currently the most widely used type of flash memories. In a NAND flash memory, although a cell block consists of many pages, to rewrite one page, the whole ...
Anxiao Jiang, Robert Mateescu, Eitan Yaakobi, Jeho...
« Prev « First page 1885 / 2083 Last » Next »