Sciweavers

3193 search results - page 541 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
MM
2010
ACM
208views Multimedia» more  MM 2010»
13 years 10 months ago
A new approach to cross-modal multimedia retrieval
The problem of joint modeling the text and image components of multimedia documents is studied. The text component is represented as a sample from a hidden topic model, learned wi...
Nikhil Rasiwasia, Jose Costa Pereira, Emanuele Cov...
CORR
2010
Springer
79views Education» more  CORR 2010»
13 years 10 months ago
A Multi-hop Multi-source Algebraic Watchdog
In our previous work (`An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police th...
MinJi Kim, Muriel Médard, João Barro...
ISDA
2006
IEEE
14 years 4 months ago
Enhancing 3D Face Recognition By Mimics Segmentation
In this paper, we present a novel approach for face recognition and authentication based on dimensional surface matching. While most of existing methods use facial intensity image...
Boulbaba Ben Amor, Mohsen Ardabilian, Liming Chen
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
14 years 7 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
13 years 10 months ago
A performance tuning methodology with compiler support
We have developed an environment, based upon robust, existing, open source software, for tuning applications written using MPI, OpenMP or both. The goal of this effort, which inte...
Oscar Hernandez, Barbara M. Chapman, Haoqiang Jin