Sciweavers

9231 search results - page 1596 / 1847
» informs 2008
Sort
View
129
Voted
CONEXT
2008
ACM
15 years 6 months ago
Efficient IP-address lookup with a shared forwarding table for multiple virtual routers
Virtual routers are a promising way to provide network services such as customer-specific routing, policy-based routing, multi-topology routing, and network virtulization. However...
Jing Fu, Jennifer Rexford
COST
2008
Springer
186views Multimedia» more  COST 2008»
15 years 6 months ago
Automatic Motherese Detection for Face-to-Face Interaction Analysis
This paper deals with emotional speech detection in home movies. In this study, we focus on infant-directed speech also called "motherese" which is characterized by highe...
Ammar Mahdhaoui, Mohamed Chetouani, Cong Zong, Raq...
136
Voted
CPAIOR
2008
Springer
15 years 6 months ago
Leveraging Belief Propagation, Backtrack Search, and Statistics for Model Counting
We consider the problem of estimating the model count (number of solutions) of Boolean formulas, and present two techniques that compute estimates of these counts, as well as eith...
Lukas Kroc, Ashish Sabharwal, Bart Selman
CRV
2008
IEEE
125views Robotics» more  CRV 2008»
15 years 6 months ago
Enhancing Steganography in Digital Images
The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabili...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
CRYPTO
2008
Springer
100views Cryptology» more  CRYPTO 2008»
15 years 6 months ago
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Abstract. This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions. The attacks use a substantial number of verif...
Helena Handschuh, Bart Preneel
« Prev « First page 1596 / 1847 Last » Next »