Sciweavers

1548 search results - page 251 / 310
» Client-Site Query Extensions
Sort
View
GLOBECOM
2008
IEEE
14 years 3 months ago
A Memory-Optimized Bloom Filter Using an Additional Hashing Function
— A Bloom filter is a simple space-efficient randomized data structure for the representation set of items in order to support membership queries. In recent years, Bloom filte...
Mahmood Ahmadi, Stephan Wong
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 3 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
INFOCOM
2008
IEEE
14 years 3 months ago
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems
—In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly localize monitors of Internet threat monitoring (ITM...
Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan, Wei Zhao
INFOCOM
2008
IEEE
14 years 3 months ago
HERO: Online Real-Time Vehicle Tracking in Shanghai
—Intelligent transportation systems have become increasingly important for the public transportation in Shanghai. In response, ShanghaiGrid (SG) aims to provide abundant intellig...
Hongzi Zhu, Yanmin Zhu, Minglu Li, Lionel M. Ni
SMI
2008
IEEE
146views Image Analysis» more  SMI 2008»
14 years 3 months ago
SHREC'08 entry: Local volumetric features for 3D model retrieval
In this paper, we describe a method of shape-based 3D model retrieval that employs a set of 3D, local, multi-scale features extracted from a voxel representation of a 3D model to ...
Kunio Osada, Takahiko Furuya, Ryutarou Ohbuchi