Sciweavers

1172 search results - page 190 / 235
» Path Algorithms on Regular Graphs
Sort
View
CORR
2007
Springer
122views Education» more  CORR 2007»
13 years 9 months ago
How to Complete a Doubling Metric
In recent years, considerable advances have been made in the study of properties of metric spaces in terms of their doubling dimension. This line of research has not only enhanced...
Anupam Gupta, Kunal Talwar
CVPR
2007
IEEE
14 years 11 months ago
Variational Distance-Dependent Image Restoration
There is a need to restore color images that suffer from distance-dependent degradation during acquisition. This occurs, for example, when imaging through scattering media. There,...
Ran Kaftory, Yoav Y. Schechner, Yehoshua Y. Zeevi
ICC
2007
IEEE
166views Communications» more  ICC 2007»
14 years 4 months ago
Accuracy and Dynamics of Multi-Stage Load Balancing for Multipath Internet Routing
— Flow-based load balancing algorithms for multipath Internet routing are often used for traffic engineering. However, the target load distribution and the load balanced result ...
Rüdiger Martin, Michael Menth, Michael Hemmke...
FPGA
1992
ACM
176views FPGA» more  FPGA 1992»
14 years 1 months ago
Minimization of Permuted Reed-Muller Trees for Cellular Logic
The new family of Field Programmable Gate Arrays, CLI6000 from Concurrent Logic Inc realizes the truly Cellular Logic. It has been mainly designed for the realization of data path...
Li-Fei Wu, Marek A. Perkowski
SEKE
2010
Springer
13 years 8 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li