12,763 Result(s)
-
Chapter and Conference Paper
System for screening objectionable images using Daubechies' wavelets and color histograms
This paper describes WIPETM (Wavelet Image Pornography Elimination), an algorithm capable of classifying an image as objectionable or benign. The algorithm uses a combination of Daubechies' wavelets, normalized c...
-
Chapter and Conference Paper
A matrix representation of phylogenetic trees
In this paper we begin by describing two currently used methods for evaluating phylogenetic trees, one proposed by Fitch and Margoliash [5] and the other proposed by Saitou and Nei [7]. Both methods are heuris...
-
Chapter and Conference Paper
High-level execution time analysis
A compositional algebra, called mMCAN, for the execution time analysis of highlevel software processes is introduced. In mMCAN, processes can be concatenated, concurrently executed, and recursively invoked. We...
-
Chapter and Conference Paper
A redundant hierarchical structure for a distributed continuous media server
The growing number of digital audio and video repositories has resulted in a desperate need for effective techniques to deliver data to users in a timely manner. Due to geographical distribution of users, it i...
-
Chapter
Domain model based hypertext for collaborative authoring
Domain information models reflect the common structural and semantic characteristics of information organization in particular domains. This chapter describes the creation of a domain model based hypertext and...
-
Chapter
Study of Multiplexing for Group-based Quality of Service Delivery
In this work, the problem of scheduling packets with a group as opposed to an individual deadline is considered. Packets of the same group are supposed to belong in the same application data unit for which a d...
-
Chapter
USD: Scalable Bandwidth Allocation for the Internet
In this paper, we present a differentiated service scheme called “User-Share Differentiation (USD)”. The USD scheme is designed for long-term bandwidth allocation without per-session signaling. The scheme allo...
-
Chapter and Conference Paper
On Zhang's nonrepudiable proxy signature schemes
In 1997, Zhang proposed two new nonrepudiable proxy signature schemes to delegate signing capability. Both schemes claimed to have a property of knowing that a proxy signature is generated by either the origin...
-
Chapter and Conference Paper
A secure intelligent trade agent system
In this paper, a secure intelligent trade agent system is developed. In this system, an intelligent trade agent can be authenticated and supplied certain authorized agent execution environment for it to run by...
-
Chapter and Conference Paper
Classifying objectionable websites based on image content
This paper describes IBCOW (Image-based Classification of Objectionable Websites), a system capable of classifying a website as objectionable or benign based on image content. The system uses WIPEℳ (Wavelet Image...
-
Chapter and Conference Paper
New results on multi-receiver authentication codes
Multi-receiver authentication is an extension of traditional point-to-point message authentication in which a sender broadcasts a single authenticated message such that all the receivers can independently veri...
-
Chapter and Conference Paper
Lower Bounds for Wide-Sense Non-blocking Clos Network
The 3-stage Clos network is generally considered the most basic multistage interconnecting network(MIN). The nonblocking property of such network has been extensively studied in the past. However there are only a...
-
Chapter and Conference Paper
A New Family of Optimal 1-Hamiltonian Graphs with Small Diameter
In this paper, we construct a family of graphs denoted by Eye(s) that are 3-regualr, 3-connected, planar, hamiltonian, edge hamiltonian, and also optimal 1-hamiltonian. Furthermore, the diameter of Eye(s) is O(lo...
-
Chapter and Conference Paper
A Graph Optimization Problem in Virtual Colonoscopy
This paper studies a graph optimization problem occurring in virtual colonoscopy, which concerns finding the central path of a colon model created from helical computed tomography (CT) image data. The central ...
-
Chapter and Conference Paper
Efficient minimization of numerical summation errors
Given a multiset X={x 1,... x n } of real numbers, the floating-point set summation (FPS) problem asks for S n ...
-
Chapter and Conference Paper
Business-Object Semantics Communication Model in Distributed Environment
Object communication usually uses message passing to transfer the request and the reply. However, in business applications many of the object requests are in fact events which trigger other business objects, a...
-
Chapter and Conference Paper
On construction of cumulative secret sharing schemes
Secret sharing schemes are one of the most important primitives in distributed systems. Cumulative secret sharing schemes provide a method to share a secret among a number of participants with arbitrary access...
-
Chapter and Conference Paper
Maximum Weight Triangulation and Its Application on Graph Drawing
In this paper, we investigate the maximum weight triangulation of a polygon inscribed in a circle (simply inscribed polygon). A complete characterization of maximum weight triangulation of such polygons has be...
-
Chapter and Conference Paper
Measuring the Quality of Service of Optimistic Replication
In large systems, replication is a useful technique for improving information accessibility and surviving network unreliability. Optimistic replication trades of consistency for availability, allowing updates ...
-
Chapter and Conference Paper
Bounds and constructions for A3-code with multi-senders
We extend authentication codes with arbiter to the scenario where there are multiple senders and none of the participants, including the arbiter, is trusted. In this paper we derive bounds on the probability o...