Sciweavers

1078 search results - page 127 / 216
» Networks with Small Stretch Number
Sort
View
ANCS
2009
ACM
15 years 1 months ago
LaFA: lookahead finite automata for scalable regular expression detection
Although Regular Expressions (RegExes) have been widely used in network security applications, their inherent complexity often limits the total number of RegExes that can be detec...
Masanori Bando, N. Sertac Artan, H. Jonathan Chao
FPGA
2012
ACM
300views FPGA» more  FPGA 2012»
13 years 11 months ago
Reducing the cost of floating-point mantissa alignment and normalization in FPGAs
In floating-point datapaths synthesized on FPGAs, the shifters that perform mantissa alignment and normalization consume a disproportionate number of LUTs. Shifters are implemente...
Yehdhih Ould Mohammed Moctar, Nithin George, Hadi ...
ICIP
2004
IEEE
16 years 5 months ago
A public-key authentication watermarking for binary images
Authentication watermarking is the process that inserts hidden data into an object (image) in order to detect any fraudulent alteration perpetrated by a malicious hacker. In the l...
Hae Yong Kim, Ricardo L. de Queiroz
ISMAR
2006
IEEE
15 years 10 months ago
Spatial relationship patterns: elements of reusable tracking and calibration systems
With tracking setups becoming increasingly complex, it gets more difficult to find suitable algorithms for tracking, calibration and sensor fusion. A large number of solutions e...
Daniel Pustka, Martin Huber, Manuel Bauer, Gudrun ...
QOFIS
2001
Springer
15 years 8 months ago
On the Utility of FEC Mechanisms for Audio Applications
FEC mechanisms have been proposed to recover from packet losses, and hence to improve the perceived quality in audio applications. Recently, it has been shown in [1] that the redun...
Eitan Altman, Chadi Barakat, Víctor M. Ramo...