Sciweavers

533 search results - page 81 / 107
» Control flow based obfuscation
Sort
View
121
Voted
PAMI
2010
135views more  PAMI 2010»
15 years 28 days ago
A Variational Approach to Degraded Document Enhancement
—The goal of this paper is to correct bleed-through in degraded documents using a variational approach. The variational model is adapted using an estimated background according t...
Reza Farrahi Moghaddam, Mohamed Cheriet
SIAMCO
2010
119views more  SIAMCO 2010»
14 years 9 months ago
On the Structure of the Minimum Time Function
A minimum time problem with a nonlinear smooth dynamics and a target satisfying an internal sphere condition is considered. Under the assumption that the minimum time T be continu...
Giovanni Colombo, Khai T. Nguyen
115
Voted
IPPS
1998
IEEE
15 years 6 months ago
A Generalized Framework for Global Communication Optimization
In distributed-memory message-passing architectures reducing communication cost is extremely important. In this paper, we present a technique to optimize communication globally. O...
Mahmut T. Kandemir, Prithviraj Banerjee, Alok N. C...
EDOC
2006
IEEE
15 years 6 months ago
An Event-Driven Workflow Engine for Service-based Business Systems
This paper discusses a novel implementation of a workflow engine that supports service-based applications. The applications are defined according to the GAT model, which is an eve...
Julian Jang, Alan Fekete, Paul Greenfield, Surya N...
109
Voted
CN
2004
98views more  CN 2004»
15 years 2 months ago
Considering spurious timeout in proxy for improving TCP performance in wireless networks
In this paper, we introduce a new proxy that effectively prevents unnecessary retransmissions of Transmission Control Protocol data segments from flowing over a wireless link on a...
Yu-Chul Kim, Dong-Ho Cho