Sciweavers

6598 search results - page 1246 / 1320
» Graph Theory with Applications
Sort
View
INFOCOM
2012
IEEE
13 years 6 months ago
SybilDefender: Defend against sybil attacks in large social networks
—Distributed systems without trusted identities are particularly vulnerable to sybil attacks, where an adversary creates multiple bogus identities to compromise the running of th...
Wei Wei, Fengyuan Xu, Chiu Chiang Tan, Qun Li
KDD
2012
ACM
242views Data Mining» more  KDD 2012»
13 years 6 months ago
Query-driven discovery of semantically similar substructures in heterogeneous networks
Heterogeneous information networks that contain multiple types of objects and links are ubiquitous in the real world, such as bibliographic networks, cyber-physical networks, and ...
Xiao Yu, Yizhou Sun, Peixiang Zhao, Jiawei Han
SODA
2012
ACM
245views Algorithms» more  SODA 2012»
13 years 6 months ago
Lower bounds for number-in-hand multiparty communication complexity, made easy
In this paper we prove lower bounds on randomized multiparty communication complexity, both in the blackboard model (where each message is written on a blackboard for all players ...
Jeff M. Phillips, Elad Verbin, Qin Zhang
CVPR
1998
IEEE
16 years 6 months ago
Incorporating Illumination Constraints in Deformable Models
In this paper we present a method for the integration of nonlinear holonomic constraints in deformable models and its application to the problems of shape and illuminant direction...
Dimitris Samaras, Dimitris N. Metaxas
CVPR
2006
IEEE
16 years 6 months ago
3D Surface Matching and Recognition Using Conformal Geometry
3D surface matching is a fundamental issue in computer vision with many applications such as shape registration, 3D object recognition and classification. However, surface matchin...
Sen Wang, Yang Wang, Miao Jin, Xianfeng Gu, Dimitr...
« Prev « First page 1246 / 1320 Last » Next »