Sciweavers

537 search results - page 27 / 108
» A Call to Regularity
Sort
View
COMSWARE
2008
IEEE
14 years 2 months ago
On implementing security at the transport layer
— We design a framework that implements security at the TCP layer to meet the necessity for a practical and truly end-to-end security solution. We call our framework TCPsec. TCPs...
Swaminathan Pichumani, Sneha Kumar Kasera
ICPR
2008
IEEE
14 years 2 months ago
Directional entropy feature for human detection
In this paper we propose a novel feature, called directional entropy feature (DEF), to improve the performance of human detection under complicated background in images. DEF descr...
Long Meng, Liang Li, Shuqi Mei, Weiguo Wu
ISSAC
2007
Springer
112views Mathematics» more  ISSAC 2007»
14 years 1 months ago
G-graphs for the cage problem: a new upper bound
Constructing some regular graph with a given girth, a given degree and the fewest possible vertices is a hard problem. This problem is called the cage graph problem and has some l...
Alain Bretto, Luc Gillibert
DNA
2004
Springer
165views Bioinformatics» more  DNA 2004»
14 years 1 months ago
Computing by Observing Bio-systems: The Case of Sticker Systems
Abstract. A very common approach in chemistry and biology is to observe the progress of an experiment, and take the result of this observation as the final output. Inspired by thi...
Artiom Alhazov, Matteo Cavaliere
WIA
2004
Springer
14 years 1 months ago
Brute Force Determinization of NFAs by Means of State Covers
Finite automata determinization is a critical operation for numerous practical applications such as regular expression search. Algorithms have to deal with the possible blow up of ...
Jean-Marc Champarnaud, Fabien Coulon, Thomas Paran...