Sciweavers

112 search results - page 19 / 23
» Polynomial-time solution of change detection problems
Sort
View
SDM
2007
SIAM
89views Data Mining» more  SDM 2007»
13 years 8 months ago
Preventing Information Leaks in Email
The widespread use of email has raised serious privacy concerns. A critical issue is how to prevent email information leaks, i.e., when a message is accidentally addressed to non-...
Vitor R. Carvalho, William W. Cohen
CORR
2008
Springer
119views Education» more  CORR 2008»
13 years 6 months ago
Self-stabilizing Numerical Iterative Computation
Many challenging tasks in sensor networks, including sensor calibration, ranking of nodes, monitoring, event region detection, collaborative filtering, collaborative signal proces...
Ezra N. Hoch, Danny Bickson, Danny Dolev
ASPDAC
2004
ACM
120views Hardware» more  ASPDAC 2004»
14 years 4 days ago
Temporal floorplanning using 3D-subTCG
Improving logic capacity by time-sharing, dynamically reconfigurable FPGAs are employed to handle designs of high complexity and functionality. In this paper, we use a novel topo...
Ping-Hung Yuh, Chia-Lin Yang, Yao-Wen Chang, Hsin-...
ICIP
2005
IEEE
14 years 8 months ago
Segmenting small regions in the presence of noise
Binary segmentation, a problem of extracting foreground objects from the background, often arises in medical imaging and document processing. Popular existing solutions include Ex...
Rashi Samur, Vitali Zagorodnov
SIGMETRICS
2004
ACM
115views Hardware» more  SIGMETRICS 2004»
14 years 3 days ago
Emulating low-priority transport at the application layer: a background transfer service
Low priority data transfer across the wide area is useful in several contexts, for example for the dissemination of large files such as OS updates, content distribution or prefet...
Peter B. Key, Laurent Massoulié, Bing Wang