Sciweavers

973 search results - page 98 / 195
» Be Prepared
Sort
View
137
Voted
PAM
2007
Springer
15 years 10 months ago
Measures of Self-similarity of BGP Updates and Implications for Securing BGP
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Geoff Huston
SEMWEB
2007
Springer
15 years 10 months ago
An Empirical Study of Instance-Based Ontology Matching
Instance-based ontology mapping is a promising family of solutions to a class of ontology alignment problems. It crucially depends on measuring the similarity between sets of annot...
Antoine Isaac, Lourens van der Meij, Stefan Schlob...
124
Voted
SGAI
2007
Springer
15 years 10 months ago
Frequent Set Meta Mining: Towards Multi-Agent Data Mining
In this paper we describe the concept of Meta ARM in the context of its objectives and challenges and go on to describe and analyse a number of potential solutions. Meta ARM is de...
Kamal Ali Albashiri, Frans Coenen, Robert Sanderso...
3DPVT
2006
IEEE
156views Visualization» more  3DPVT 2006»
15 years 10 months ago
Visual Hull Construction in the Presence of Partial Occlusion
In this paper, we propose a visual hull algorithm, which guarantees a correct construction even in the presence of partial occlusion, while “correct” here means that the real ...
Li Guan, Sudipta N. Sinha, Jean-Sébastien F...
116
Voted
ACSAC
2006
IEEE
15 years 10 months ago
Bluetooth Worms: Models, Dynamics, and Defense Implications
Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....
Guanhua Yan, Stephan Eidenbenz