Sciweavers

6393 search results - page 1147 / 1279
» Randomized Algorithms on the Mesh
Sort
View
118
Voted
COLT
2008
Springer
15 years 4 months ago
On the Power of Membership Queries in Agnostic Learning
We study the properties of the agnostic learning framework of Haussler [Hau92] and Kearns, Schapire and Sellie [KSS94]. In particular, we address the question: is there any situat...
Vitaly Feldman
CONEXT
2008
ACM
15 years 4 months ago
High performance traffic shaping for DDoS mitigation
Distributed Denial of Service (DDoS) attack mitigation systems usually generate a list of filter rules in order to block malicious traffic. In contrast to this binary decision we ...
Markus Goldstein, Matthias Reif, Armin Stahl, Thom...
138
Voted
DAGM
2008
Springer
15 years 4 months ago
Resolution Enhancement of PMD Range Maps
Photonic mixer device (PMD) range cameras are becoming popular as an alternative to algorithmic 3D reconstruction but their main drawbacks are low-resolution (LR) and noise. Recent...
A. N. Rajagopalan, Arnav V. Bhavsar, Frank Wallhof...
DAS
2008
Springer
15 years 4 months ago
Super-Resolution of Text Images Using Edge-Directed Tangent Field
This paper presents an edge-directed super-resolution algorithm for gray level document images without using any training set. This technique creates an image with smooth regions ...
Jyotirmoy Banerjee, C. V. Jawahar
157
Voted
FSE
2008
Springer
177views Cryptology» more  FSE 2008»
15 years 4 months ago
MD4 is Not One-Way
MD4 is a hash function introduced by Rivest in 1990. It is still used in some contexts, and the most commonly used hash function (MD5, SHA-1, SHA-2) are based on the design princip...
Gaëtan Leurent
« Prev « First page 1147 / 1279 Last » Next »