Sciweavers

9071 search results - page 1808 / 1815
» A co-design modeling approach for computer network systems
Sort
View
SIGIR
2009
ACM
14 years 2 months ago
CompositeMap: a novel framework for music similarity measure
With the continuing advances in data storage and communication technology, there has been an explosive growth of music information from different application domains. As an effe...
Bingjun Zhang, Jialie Shen, Qiaoliang Xiang, Ye Wa...
ACSAC
2007
IEEE
14 years 1 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda
RTCSA
2007
IEEE
14 years 1 months ago
A Continuous Query Index for Processing Queries on RFID Data Stream
RFID middleware systems collect and filter RFID streaming data gathered continuously by numerous readers to process requests from applications. These requests are called continuou...
Jaekwan Park, Bonghee Hong, ChaeHoon Ban
CCS
2005
ACM
14 years 1 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
MIR
2003
ACM
174views Multimedia» more  MIR 2003»
14 years 24 days ago
Content-based image retrieval by clustering
In a typical content-based image retrieval (CBIR) system, query results are a set of images sorted by feature similarities with respect to the query. However, images with high fea...
Yixin Chen, James Ze Wang, Robert Krovetz
« Prev « First page 1808 / 1815 Last » Next »