Sciweavers

1141 search results - page 150 / 229
» Analyzing Electroencephalograms Using Cloud Computing Techni...
Sort
View
137
Voted
NDSS
2008
IEEE
15 years 11 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
ICIP
2006
IEEE
16 years 6 months ago
Content Extraction and Summarization of Instructional Videos
This paper presents a robust approach to extracting and summarizing the textual content of instructional videos for handwritten recognition, indexing and retrieval, and other elea...
Tiecheng Liu, Chekuri Choudary
AAAI
2004
15 years 5 months ago
Distributed Representation of Syntactic Structure by Tensor Product Representation and Non-Linear Compression
Representing lexicons and sentences with the subsymbolic approach (using techniques such as Self Organizing Map (SOM) or Artificial Neural Network (ANN)) is a relatively new but i...
Heidi H. T. Yeung, Peter W. M. Tsang
CGF
2008
130views more  CGF 2008»
15 years 4 months ago
Reduced Depth and Visual Hulls of Complex 3D Scenes
Depth and visual hulls are useful for quick reconstruction and rendering of a 3D object based on a number of reference views. However, for many scenes, especially multi-object, th...
Alexander Bogomjakov, Craig Gotsman
CN
2006
99views more  CN 2006»
15 years 4 months ago
P2P reputation management: Probabilistic estimation vs. social networks
Managing trust is a key issue for a wide acceptance of P2P computing, particularly in critical areas such as e-commerce. Reputation-based trust management has been identified in t...
Zoran Despotovic, Karl Aberer