Sciweavers

2503 search results - page 462 / 501
» Building Computer Network Attacks
Sort
View
FQAS
2009
Springer
157views Database» more  FQAS 2009»
14 years 2 months ago
On Fuzzy vs. Metric Similarity Search in Complex Databases
Abstract. The task of similarity search is widely used in various areas of computing, including multimedia databases, data mining, bioinformatics, social networks, etc. For a long ...
Alan Eckhardt, Tomás Skopal, Peter Vojt&aac...
SIGCOMM
2009
ACM
14 years 2 months ago
Epothecary: cost-effective drug pedigree tracking and authentication using mobile phones
Counterfeit and expired pharmaceuticals are a significant problem in the developing world, constituting up to 80% of stock on pharmacy shelves. This is due both to poor existing ...
Michael Paik, Jay Chen, Lakshminarayanan Subramani...
ICASSP
2008
IEEE
14 years 2 months ago
Bayesian update of dialogue state for robust dialogue systems
This paper presents a new framework for accumulating beliefs in spoken dialogue systems. The technique is based on updating a Bayesian Network that represents the underlying state...
Blaise Thomson, Jost Schatzmann, Steve Young
COLCOM
2007
IEEE
14 years 2 months ago
Uncompressed HD video for collaborative teaching - an experiment
Abstract—This article describes a distributed classroom experiment carried out by five universities in the US and Europe at the beginning of 2007. This experiment was motivated ...
Andrei Hutanu, Ravi Paruchuri, Daniel Eiland, Milo...
ICIC
2007
Springer
14 years 2 months ago
Evolutionary Ensemble for In Silico Prediction of Ames Test Mutagenicity
Driven by new regulations and animal welfare, the need to develop in silico models has increased recently as alternative approaches to safety assessment of chemicals without animal...
Huanhuan Chen, Xin Yao