Sciweavers

388 search results - page 73 / 78
» Anti-Aliased Volume Extraction
Sort
View
ICC
2008
IEEE
118views Communications» more  ICC 2008»
14 years 5 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao
ICCV
2007
IEEE
14 years 5 months ago
Motion Analysis of Endovascular Stent-Grafts by MDL Based Registration
The endovascular repair of a traumatic rupture of the thoracic aorta - that would otherwise lead to the death of the patient - is performed by delivering a stent-graft into the ve...
Georg Langs, Nikos Paragios, Rene Donner, Pascal D...
ICDE
2007
IEEE
155views Database» more  ICDE 2007»
14 years 5 months ago
Query-Aware Sampling for Data Streams
Data Stream Management Systems are useful when large volumes of data need to be processed in real time. Examples include monitoring network traffic, monitoring financial transacti...
Theodore Johnson, S. Muthukrishnan, Vladislav Shka...
ASIACRYPT
2007
Springer
14 years 5 months ago
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Spring...
Matthew Green, Susan Hohenberger
CIVR
2007
Springer
177views Image Analysis» more  CIVR 2007»
14 years 5 months ago
Matching ottoman words: an image retrieval approach to historical document indexing
Large archives of Ottoman documents are challenging to many historians all over the world. However, these archives remain inaccessible since manual transcription of such a huge vo...
Esra Ataer, Pinar Duygulu