Sciweavers

2168 search results - page 186 / 434
» Using Approximation Hardness to Achieve Dependable Computati...
Sort
View
HICSS
2003
IEEE
184views Biometrics» more  HICSS 2003»
15 years 9 months ago
Content Based File Type Detection Algorithms
Identifying the true type of a computer file can be a difficult problem. Previous methods of file type recognition include fixed file extensions, fixed “magic numbers” stored ...
Mason McDaniel, Mohammad Hossain Heydari
IACR
2011
125views more  IACR 2011»
14 years 4 months ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...
RIDE
1998
IEEE
15 years 8 months ago
On Periodic Resource Scheduling for Continuous Media Databases
The Enhanced Pay-Per-View (EPPV) model for providing continuous-media services associates with each continuous-media clip a display frequency that depends on the clip's popula...
Minos N. Garofalakis, Banu Özden, Abraham Sil...
ICTAI
2008
IEEE
15 years 11 months ago
Automatic Design of Robot Behaviors through Constraint Network Acquisition
Control architectures, such as the LAAS architecture [1], CLARATY [12] and HARPIC [9], have been developped to provide autonomy to robots. To achieve a robot’s task, these contr...
Mathias Paulin, Christian Bessiere, Jean Sallantin
ICPR
2008
IEEE
15 years 11 months ago
Medical image segmentation via min s-t cuts with sides constraints
Graph cut algorithms (i.e., min s-t cuts) [3][10][15] are useful in many computer vision applications. In this paper we develop a formulation that allows the addition of side cons...
Jiun-Hung Chen, Linda G. Shapiro