Sciweavers

334 search results - page 10 / 67
» A first step towards algorithm plagiarism detection
Sort
View
WACV
2008
IEEE
14 years 1 months ago
Toward Fully Automatic Geo-Location and Geo-Orientation of Static Outdoor Cameras
Automating tools for geo-locating and geo-orienting static cameras is a key step in creating a useful global imaging network from cameras attached to the Internet. We present algo...
Nathan Jacobs, Nathaniel Roman, Robert Pless
IJCNLP
2005
Springer
14 years 27 days ago
A Chunking Strategy Towards Unknown Word Detection in Chinese Word Segmentation
This paper proposes a chunking strategy to detect unknown words in Chinese word segmentation. First, a raw sentence is pre-segmented into a sequence of word atoms 1 using a maximum...
Guodong Zhou
SDM
2008
SIAM
206views Data Mining» more  SDM 2008»
13 years 8 months ago
Latent Variable Mining with Its Applications to Anomalous Behavior Detection
In this paper, we propose a new approach to anomaly detection by looking at the latent variable space to make the first step toward latent anomaly detection. Most conventional app...
Shunsuke Hirose, Kenji Yamanishi
CCR
2010
100views more  CCR 2010»
13 years 7 months ago
Towards understanding bugs in open source router software
Software errors and vulnerabilities in core Internet routers have led to several high-profile attacks on the Internet infrastructure and numerous outages. Building an understandin...
Zuoning Yin, Matthew Caesar, Yuanyuan Zhou
CORR
2010
Springer
126views Education» more  CORR 2010»
13 years 7 months ago
Towards Providing Low-Risk and Economically Feasible Network Data Transfer Services
: - In the first part of this paper we present the first steps towards providing low-risk and economically feasible network data transfer services. We introduce three types of data...
Mugurel Ionut Andreica, Vasile Deac, Stelian Tipa