Sciweavers

12697 search results - page 2184 / 2540
» Call for Papers
Sort
View
SIGCOMM
2006
ACM
15 years 10 months ago
Algorithms to accelerate multiple regular expressions matching for deep packet inspection
There is a growing demand for network devices capable of examining the content of data packets in order to improve network security and provide application-specific services. Most...
Sailesh Kumar, Sarang Dharmapurikar, Fang Yu, Patr...
SIGCOMM
2005
ACM
15 years 10 months ago
One more bit is enough
Achieving efficient and fair bandwidth allocation while minimizing packet loss in high bandwidth-delay product networks has long been a daunting challenge. Existing endto-end cong...
Yong Xia, Lakshminarayanan Subramanian, Ion Stoica...
129
Voted
AUSAI
2005
Springer
15 years 10 months ago
New Feature Extraction Approaches for Face Recognition
All the traditional PCA-based and LDA-based methods are based on the analysis of vectors. So, it is difficult to evaluate the covariance matrices in such a high-dimensional vector ...
Vo Dinh Minh Nhat, Sungyoung Lee
VLDB
2005
ACM
126views Database» more  VLDB 2005»
15 years 10 months ago
Hubble: An Advanced Dynamic Folder Technology for XML
A significant amount of information is stored in computer systems today, but people are struggling to manage their documents such that the information is easily found. XML is a de...
Ning Li, Joshua Hui, Hui-I Hsiao, Kevin S. Beyer
ASIACRYPT
2004
Springer
15 years 10 months ago
Improved Setup Assumptions for 3-Round Resettable Zero Knowledge
In the bare public-key model, introduced by Canetti et al. [STOC 2000], it is only assumed that each verifier deposits during a setup phase a public key in a file accessible by a...
Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Vis...
« Prev « First page 2184 / 2540 Last » Next »