Sciweavers

515 search results - page 44 / 103
» A Strategy for Information Source Identification
Sort
View
139
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
Towards a Theory of Anonymous Networking
The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination...
Javad Ghaderi, Rayadurgam Srikant
156
Voted
DSOM
2007
Springer
15 years 9 months ago
NADA - Network Anomaly Detection Algorithm
This paper deals with a new iterative Network Anomaly Detection Algorithm – NADA, which accomplishes the detection, classification and identification of traffic anomalies. NADA f...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...
CLIN
2000
15 years 4 months ago
Proper Name Extraction from Non-Journalistic Texts
This paper discusses the influence of the corpus on the automatic identification of proper names in texts. Techniques developed for the newswire genre are generally not sufficient...
Thierry Poibeau, Leila Kosseim
ICIP
2005
IEEE
16 years 5 months ago
Feedback-based dynamic generalized LDA for face recognition
Linear Discriminant Analysis(LDA) is widely-used in face recognition systems. However, with the traditional formulation, the available information in the training samples is not su...
Dahua Lin, Shuicheng Yan, Xiaoou Tang
FLAIRS
2007
15 years 5 months ago
Discourse Automatic Annotation of Texts: An Application to Summarization
The exploitation of the discourse structure of a text and the identification of the discourse categories are essential elements for the automatic summarization, as well as for the...
Antoine Blais, Iana Atanassova, Jean-Pierre Descl&...