Sciweavers

1997 search results - page 361 / 400
» A Model for Data Leakage Detection
Sort
View
ICCCN
2008
IEEE
14 years 5 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
ICPR
2008
IEEE
14 years 5 months ago
Approximation of salient contours in cluttered scenes
This paper proposes a new approach to describe the salient contours in cluttered scenes. No need to do the preprocessing, such as edge detection, we directly use a set of random s...
Rui Huang, Nong Sang, Qiling Tang
BIBM
2007
IEEE
162views Bioinformatics» more  BIBM 2007»
14 years 5 months ago
Multiple Interacting Subcellular Structure Tracking by Sequential Monte Carlo Method
With the wide application of green fluorescent protein (GFP) in the study of live cells, there is a surging need for the computer-aided analysis on the huge amount of image seque...
Quan Wen, Jean Gao, Kate Luby-Phelps
ICDIM
2006
IEEE
14 years 5 months ago
Investigating Web-Based Approaches to Revealing Prototypical Music Artists in Genre Taxonomies
— We present three general approaches to detecting prototypical entities in a given taxonomy and apply them to a music information retrieval (MIR) problem. More precisely, we try...
Markus Schedl, Peter Knees, Gerhard Widmer
SAC
2006
ACM
14 years 5 months ago
Post-partition reconciliation protocols for maintaining consistency
This paper addresses design exploration for protocols that are employed in systems with availability-consistency tradeoffs. Distributed data is modelled as states of objects repl...
Mikael Asplund, Simin Nadjm-Tehrani