Sciweavers

455 search results - page 14 / 91
» Structure Theorems for Systems of Segments
Sort
View
CSREASAM
2003
13 years 10 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
CBMS
2006
IEEE
14 years 2 months ago
Automatic Segmentation of Neck CT Images
In this era of cross-sectional imaging, it is useful to think of the neck in terms of adjacent anatomical spaces separated by fascial layers extended from the skull base to the th...
Chia-Chi Teng, Linda G. Shapiro, Ira Kalet
CADE
2007
Springer
14 years 9 months ago
System Description: E-KRHyper
The E-KRHyper system is a model generator and theorem prover for first-order logic with equality. It implements the new E-hyper tableau calculus, which integrates a superposition-b...
Björn Pelzer, Christoph Wernhard
KDD
2004
ACM
114views Data Mining» more  KDD 2004»
14 years 9 months ago
Mining reference tables for automatic text segmentation
Automatically segmenting unstructured text strings into structured records is necessary for importing the information contained in legacy sources and text collections into a data ...
Eugene Agichtein, Venkatesh Ganti
FAST
2008
13 years 11 months ago
Avoiding the Disk Bottleneck in the Data Domain Deduplication File System
Disk-based deduplication storage has emerged as the new-generation storage system for enterprise data protection to replace tape libraries. Deduplication removes redundant data se...
Benjamin Zhu, Kai Li, R. Hugo Patterson