Sciweavers

2542 search results - page 131 / 509
» One step ahead
Sort
View
ESA
2005
Springer
176views Algorithms» more  ESA 2005»
14 years 2 months ago
On Degree Constrained Shortest Paths
Abstract. Traditional shortest path problems play a central role in both the design and use of communication networks and have been studied extensively. In this work, we consider a...
Samir Khuller, Kwangil Lee, Mark A. Shayman
ESORICS
2005
Springer
14 years 2 months ago
Privacy Preserving Clustering
The freedom and transparency of information flow on the Internet has heightened concerns of privacy. Given a set of data items, clustering algorithms group similar items together...
Somesh Jha, Louis Kruger, Patrick McDaniel
FSE
2005
Springer
85views Cryptology» more  FSE 2005»
14 years 2 months ago
Analysis of the Non-linear Part of Mugi
This paper presents the results of a preliminary analysis of the stream cipher Mugi. We study the nonlinear component of this cipher and identify several potential weaknesses in it...
Alex Biryukov, Adi Shamir
PCM
2005
Springer
157views Multimedia» more  PCM 2005»
14 years 2 months ago
Segmentation of the Liver Using the Deformable Contour Method on CT Images
Abstract. Automatic liver segmentation from abdominal computed tomography (CT) images is one of the most important steps for computeraided diagnosis (CAD) for liver CT. However, th...
Seong-Jae Lim, Yong-Yeon Jeong, Yo-Sung Ho
ACNS
2004
Springer
128views Cryptology» more  ACNS 2004»
14 years 2 months ago
A Novel Framework for Alert Correlation and Understanding
Abstract. We propose a novel framework named Hidden Colored PetriNet for Alert Correlation and Understanding (HCPN-ACU) in intrusion detection system. This model is based upon the ...
Dong Yu, Deborah A. Frincke