Sciweavers

3305 search results - page 81 / 661
» Can we Rely on SQL
Sort
View
COMSNETS
2012
222views more  COMSNETS 2012»
12 years 3 months ago
Exploring the design space of social network-based Sybil defenses
—Recently, there has been significant research interest in leveraging social networks to defend against Sybil attacks. While much of this work may appear similar at first glanc...
Bimal Viswanath, Mainack Mondal, Allen Clement, Pe...
ICIP
2003
IEEE
14 years 9 months ago
JPEG 2000 coding of color-quantized images
The efficiency of compressing color-quantized images using general purpose lossless image coding methods depends on the degree of smoothness of the index images. A wellknown and v...
António J. R. Neves, Armando J. Pinho
SAC
2006
ACM
14 years 1 months ago
A posteriori defensive programming: an annotation toolkit for DoS-resistant component-based architectures
Denial-of-Service (DoS) attacks are a major concern for modern distributed applications. They exploit weakness in the software in order to make it unavailable to well-behaved user...
Valerio Schiavoni, Vivien Quéma
CONSTRAINTS
2002
96views more  CONSTRAINTS 2002»
13 years 7 months ago
QOCA: A Constraint Solving Toolkit for Interactive Graphical Applications
We describe an object-oriented constraint solving toolkit, QOCA, designed for interactive graphical applications. It has a simple yet powerful interface based on the metric space m...
Kim Marriott, Sitt Sen Chok
PAMI
2012
11 years 10 months ago
Monocular 3D Reconstruction of Locally Textured Surfaces
— Most recent approaches to monocular non-rigid 3D shape recovery rely on exploiting point correspondences and work best when the whole surface is well-textured. The alternative ...
Aydin Varol, Appu Shaji, Mathieu Salzmann, Pascal ...