Sciweavers

2127 search results - page 263 / 426
» Computing large matchings fast
Sort
View
WCNC
2008
IEEE
15 years 10 months ago
Iterative Detection of Three-Stage Concatenated FFH-MFSK
Abstract— Serially concatenated and iteratively decoded Irregular Variable Length Coding (IrVLC) combined with precoded Fast Frequency Hopping (FFH) M-ary Frequency Shift Keying ...
Sohail Ahmed, Robert G. Maunder, Lie-Liang Yang, L...
ICNP
2007
IEEE
15 years 10 months ago
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms
—It is crucial to detect zero-day polymorphic worms and to generate signatures at the edge network gateways or honeynets so that we can prevent the worms from propagating at thei...
Zhichun Li, Lanjia Wang, Yan Chen, Zhi Fu
SCALESPACE
2007
Springer
15 years 10 months ago
3D Object Recognition by Eigen-Scale-Space of Contours
People often recognize 3D objects by their boundary shape. Designing an algorithm for such a task is interesting and useful for retrieving objects from a shape database. In this pa...
Tim K. Lee, Mark S. Drew
ISMAR
2006
IEEE
15 years 10 months ago
Going out: robust model-based tracking for outdoor augmented reality
This paper presents a model-based hybrid tracking system for outdoor augmented reality in urban environments enabling accurate, realtime overlays for a handheld device. The system...
Gerhard Reitmayr, Tom Drummond
HOTI
2005
IEEE
15 years 10 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood