Sciweavers

765 search results - page 104 / 153
» Attraction and cooperation in space
Sort
View
DASFAA
2007
IEEE
143views Database» more  DASFAA 2007»
14 years 4 months ago
Using Redundant Bit Vectors for Near-Duplicate Image Detection
Images are amongst the most widely proliferated form of digital information due to affordable imaging technologies and the Web. In such an environment, the use of digital watermar...
Jun Jie Foo, Ranjan Sinha
ICDE
2007
IEEE
131views Database» more  ICDE 2007»
14 years 4 months ago
Incremental Clustering of Mobile Objects
Moving objects are becoming increasingly attractive to the data mining community due to continuous advances in technologies like GPS, mobile computers, and wireless communication ...
Sigal Elnekave, Mark Last, Oded Maimon
INFOCOM
2007
IEEE
14 years 4 months ago
Tree, Segment Table, and Route Bucket: A Multi-Stage Algorithm for IPv6 Routing Table Lookup
—Next generation internet protocol, IPv6, has attracted growing attention and has been deploying worldwide. With 128-bit address, IPv6 provides an extremely large address space a...
Zhenqiang Li, Dongqu Zheng, Yan Ma
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
14 years 4 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
CICLING
2007
Springer
14 years 4 months ago
Finite-State Technology as a Programming Environment
Finite-state technology is considered the preferred model for representing the phonology and morphology of natural languages. The attractiveness of this technology for natural lang...
Shuly Wintner