Sciweavers

325 search results - page 30 / 65
» Detecting Merging and Splitting using Origin Analysis
Sort
View
129
Voted
ACIVS
2008
Springer
15 years 9 months ago
Robust Curvature Extrema Detection Based on New Numerical Derivation
Abstract. Extrema of curvature are useful key points for different image analysis tasks. Indeed, polygonal approximation or arc decomposition methods used often these points to ini...
Cédric Join, Salvatore Tabbone
154
Voted
OPODIS
2003
15 years 3 months ago
Detecting Temporal Logic Predicates in Distributed Programs Using Computation Slicing
Detecting whether a finite execution trace (or a computation) of a distributed program satisfies a given predicate, called predicate detection, is a fundamental problem in distr...
Alper Sen, Vijay K. Garg
SERSCISA
2009
Springer
15 years 9 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
112
Voted
ICIP
2006
IEEE
16 years 4 months ago
A New Method for Boundary-Based Shape Matching and Retrieval
This paper presents a novel method for efficient boundary based shapes matching and retrieval in presence of occlusion. In this method, the geometric and topological information o...
Minh-Son Dao, Raffaele de Amicis
WOWMOM
2005
ACM
87views Multimedia» more  WOWMOM 2005»
15 years 8 months ago
Reputation Management for Collaborative Content Distribution
We propose a reputation-based trust management system, ROCQ, to reduce inauthentic and corrupted file transfers in end-user collaborative content-distribution systems. Such syste...
Anurag Garg, Roberto G. Cascella