Sciweavers

1875 search results - page 302 / 375
» Automatic Network Protocol Analysis
Sort
View
SP
1996
IEEE
106views Security Privacy» more  SP 1996»
14 years 1 months ago
Security Properties and CSP
Security properties such as con dentiality and authenticity may be considered in terms of the ow of messages within a network. To the extent that this characterisation is justi ed...
Steve Schneider
WSC
2008
13 years 11 months ago
Simulating the performance of a Class-Based Weighted Fair Queueing system
Class Based Weighted Fair Queueing (CBWFQ) is a very important router discipline that allows different types of Internet Protocol (IP) traffic like voice, video, and best effort d...
Martin J. Fischer, Denise M. Bevilacqua Masi, John...
ECCV
2000
Springer
14 years 10 months ago
Non-linear Bayesian Image Modelling
In recent years several techniques have been proposed for modelling the low-dimensional manifolds, or `subspaces', of natural images. Examples include principal component anal...
Christopher M. Bishop, John M. Winn
IUI
2009
ACM
14 years 5 months ago
You can play that again: exploring social redundancy to derive highlight regions in videos
Identifying highlights in multimedia content such as video and audio is currently a very difficult technical problem. We present and evaluate a novel algorithm that identifies hig...
Jose San Pedro, Vaiva Kalnikaité, Steve Whi...
MM
2009
ACM
147views Multimedia» more  MM 2009»
14 years 1 months ago
Wearing a YouTube hat: directors, comedians, gurus, and user aggregated behavior
While existing studies on YouTube’s massive user-generated video content have mostly focused on the analysis of videos, their characteristics, and network properties, little att...
Joan-Isaac Biel, Daniel Gatica-Perez