Sciweavers

6770 search results - page 1043 / 1354
» How GPUs Work
Sort
View
191
Voted
IH
2007
Springer
15 years 8 months ago
Soft Feature-Based Watermark Decoding with Insertion/Deletion Correction
Abstract. Hard decisions constitute the major problem in digital watermarking applications, especially when content adaptive embedding methods are used. Soft-decision decoding, on ...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
134
Voted
OTM
2007
Springer
15 years 8 months ago
Parallelizing Tableaux-Based Description Logic Reasoning
Practical scalability of Description Logic (DL) reasoning is an important premise for the adoption of OWL in a real-world setting. Many highly efficient optimizations for the DL ta...
Thorsten Liebig, Felix Müller
108
Voted
DASFAA
2006
IEEE
136views Database» more  DASFAA 2006»
15 years 8 months ago
Reuse or Never Reuse the Deleted Labels in XML Query Processing Based on Labeling Schemes
To facilitate the XML query processing, several kinds of labeling schemes have been proposed. Based on the labeling schemes, the ancestordescendant and parent-child relationships i...
Changqing Li, Tok Wang Ling, Min Hu
118
Voted
ICDM
2006
IEEE
214views Data Mining» more  ICDM 2006»
15 years 8 months ago
Forecasting Skewed Biased Stochastic Ozone Days: Analyses and Solutions
Much work on skewed, stochastic, high dimensional, and biased datasets usually implicitly solve each problem separately. Recently however, we have been approached by Texas Commiss...
Kun Zhang, Wei Fan, Xiaojing Yuan, Ian Davidson, X...
127
Voted
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 8 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
« Prev « First page 1043 / 1354 Last » Next »