Sciweavers

101 search results - page 13 / 21
» The Bloom paradox: When not to use a Bloom filter
Sort
View
VLDB
2004
ACM
180views Database» more  VLDB 2004»
14 years 1 months ago
Bloom Histogram: Path Selectivity Estimation for XML Data with Updates
Cost-based XML query optimization calls for accurate estimation of the selectivity of path expressions. Some other interactive and internet applications can also benefit from suc...
Wei Wang 0011, Haifeng Jiang, Hongjun Lu, Jeffrey ...
CSB
2005
IEEE
166views Bioinformatics» more  CSB 2005»
14 years 2 months ago
Artificial Neural Networks to Predict Daylily Hybrids
Artificial Neural Networks (ANN) were employed to predict daylily (Hemerocalli spp.) hybrids from known characteristics of parents used in hybridization. Features such as height, ...
Ramana M. Gosukonda, Masoud Naghedolfeizi, Johnny ...
ICASSP
2009
IEEE
14 years 3 months ago
An efficient and robust method for detecting copy-move forgery
Copy-move forgery is a specific type of image tampering, where a part of the image is copied and pasted on another part of the same image. In this paper, we propose a new approac...
Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon
ICC
2007
IEEE
109views Communications» more  ICC 2007»
14 years 2 months ago
A TCP Connection Establishment Filter: Symmetric Connection Detection
— Network measurement at 10+Gbps speeds imposes many restrictions on the resource consumption of the measurement application, making any filtering of input data highly desirable...
Brad Whitehead, Chung-Horng Lung, Peter Rabinovitc...
JSAC
2006
163views more  JSAC 2006»
13 years 8 months ago
Fast and Scalable Pattern Matching for Network Intrusion Detection Systems
High-speed packet content inspection and filtering devices rely on a fast multi-pattern matching algorithm which is used to detect predefined keywords or signatures in the packets....
Sarang Dharmapurikar, John W. Lockwood