Assessing the similarity among 3D shapes is a challenging research topic, and effective shape descriptions have to be devised in order to support the matching process. There is a ...
We introduce different mobile network applications and show to which degree the concept of database transactions is required within the applications. We show properties of transact...
We present Beaver, a method and architecture to "build dams" to protect servers from Denial of Service (DoS) attacks. Beaver allows efficient filtering of DoS traffic us...
Gal Badishi, Idit Keidar, Amir Herzberg, Oleg Roma...
We describe the challenge of combining continuous computer vision techniques and qualitative, symbolic methods to achieve a system capable of cognitive vision. Key to a truly cogni...
Anthony G. Cohn, David C. Hogg, Brandon Bennett, V...
This paper proposes a construction for collision resistant 2n-bit hash functions, based on n-bit block ciphers with 2n-bit keys. The construction is analysed in the ideal cipher mo...