Sciweavers

1702 search results - page 65 / 341
» Using Nondeterminism to Design Efficient Deterministic Algor...
Sort
View
ANCS
2007
ACM
13 years 11 months ago
Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia
The importance of network security has grown tremendously and a collection of devices have been introduced, which can improve the security of a network. Network intrusion detectio...
Sailesh Kumar, Balakrishnan Chandrasekaran, Jonath...
TMI
2008
122views more  TMI 2008»
13 years 7 months ago
Tractography Gone Wild: Probabilistic Fibre Tracking Using the Wild Bootstrap With Diffusion Tensor MRI
Diffusion tensor magnetic resonance imaging (DT-MRI) permits the noninvasive assessment of tissue microstructure and, with fibre-tracking algorithms, allows for the 3-D trajectorie...
D. K. Jones
TMI
2010
298views more  TMI 2010»
13 years 2 months ago
An Efficient Numerical Method for General Lp Regularization in Fluorescence Molecular Tomography
Abstract--Reconstruction algorithms for fluorescence tomography have to address two crucial issues : (i) the ill-posedness of the reconstruction problem, (ii) the large scale of nu...
Jean-Charles Baritaux, Kai Hassler, Michael Unser
SIGECOM
2003
ACM
107views ECommerce» more  SIGECOM 2003»
14 years 1 months ago
Using value queries in combinatorial auctions
Combinatorial auctions, where bidders can bid on bundles of items are known to be desirable auction mechanisms for selling items that are complementary and/or substitutable. Howev...
Benoît Hudson, Tuomas Sandholm
TMC
2010
138views more  TMC 2010»
13 years 6 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu