Sciweavers

1221 search results - page 202 / 245
» A Comparison of Two Programming Models for Pervasive Computi...
Sort
View
ICDE
2009
IEEE
126views Database» more  ICDE 2009»
14 years 3 months ago
Instant Advertising in Mobile Peer-to-Peer Networks
— To explore the benefit of advertising instant and location-aware commercials that can not be effectively promoted by traditional medium like TV program and Internet, we propos...
Zaiben Chen, Heng Tao Shen, Quanqing Xu, Xiaofang ...
RAID
2007
Springer
14 years 2 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
CVPR
2005
IEEE
14 years 10 months ago
Local Color Transfer via Probabilistic Segmentation by Expectation-Maximization
We address the problem of regional color transfer between two natural images by probabilistic segmentation. We use a new Expectation-Maximization (EM) scheme to impose both spatia...
Yu-Wing Tai, Jiaya Jia, Chi-Keung Tang
GFKL
2005
Springer
142views Data Mining» more  GFKL 2005»
14 years 2 months ago
Near Similarity Search and Plagiarism Analysis
Abstract. Existing methods to text plagiarism analysis mainly base on “chunking”, a process of grouping a text into meaningful units each of which gets encoded by an integer nu...
Benno Stein, Sven Meyer zu Eissen
ICALP
2009
Springer
14 years 3 months ago
Qualitative Concurrent Stochastic Games with Imperfect Information
Abstract. We study a model of games that combines concurrency, imperfect information and stochastic aspects. Those are finite states games in which, at each round, the two players...
Vincent Gripon, Olivier Serre