Sciweavers

680 search results - page 56 / 136
» Analyzing the Effectiveness and Applicability of Co-training
Sort
View
ICC
2009
IEEE
113views Communications» more  ICC 2009»
13 years 6 months ago
Using GMM and SVM-Based Techniques for the Classification of SSH-Encrypted Traffic
When employing cryptographic tunnels such as the ones provided by Secure Shell (SSH) to protect their privacy on the Internet, users expect two forms of protection. First, they aim...
Maurizio Dusi, Alice Este, Francesco Gringoli, Luc...
ICMCS
2009
IEEE
106views Multimedia» more  ICMCS 2009»
13 years 6 months ago
Modeling and analysis of content identification
Content fingerprinting provides a compact content-based representation of a multimedia document. An important application of fingerprinting is the identification of modified copie...
Avinash L. Varna, Min Wu
PE
2011
Springer
266views Optimization» more  PE 2011»
13 years 3 months ago
Lumping partially symmetrical stochastic models
Performance and dependability evaluation of complex systems by means of dynamic stochastic models (e.g. Markov chains) may be impaired by the combinatorial explosion of their stat...
Souheib Baarir, Marco Beccuti, Claude Dutheillet, ...
JMLR
2010
132views more  JMLR 2010»
13 years 3 months ago
On the Impact of Kernel Approximation on Learning Accuracy
Kernel approximation is commonly used to scale kernel-based algorithms to applications containing as many as several million instances. This paper analyzes the effect of such appr...
Corinna Cortes, Mehryar Mohri, Ameet Talwalkar
ICASSP
2011
IEEE
13 years 16 days ago
Efficient NLMS and RLS algorithms for a class of nonlinear filters using periodic input sequences
The paper discusses computationally efficient NLMS and RLS algorithms for a broad class of nonlinear filters using periodic input sequences. The class comprises all nonlinear ...
Alberto Carini, V. John Mathews, Giovanni L. Sicur...