Sciweavers

3556 search results - page 630 / 712
» Can machine learning be secure
Sort
View
VL
2009
IEEE
126views Visual Languages» more  VL 2009»
14 years 5 months ago
Predicting reuse of end-user web macro scripts
Repositories of code written by end-user programmers are beginning to emerge, but when a piece of code is new or nobody has yet reused it, then current repositories provide users ...
Christopher Scaffidi, Christopher Bogart, Margaret...
MUE
2009
IEEE
144views Multimedia» more  MUE 2009»
14 years 5 months ago
Maxtream: Stabilizing P2P Streaming by Active Prediction of Behavior Patterns
In theory, peer-to-peer (P2P) based streaming designs and simulations provide a promising alternative to serverbased streaming systems both in cost and scalability. In practice ho...
Shay Horovitz, Danny Dolev
INFOCOM
2009
IEEE
14 years 4 months ago
ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks
—Dynamic spectrum access has been proposed as a means to share scarce radio resources, and requires devices to follow protocols that use resources in a proper, disciplined manner...
Song Liu, Yingying Chen, Wade Trappe, Larry J. Gre...
AMI
2009
Springer
14 years 4 months ago
Behavior Analysis Based on Coordinates of Body Tags
This paper describes fall detection, activity recognition and the detection of anomalous gait in the Confidence project. The project aims to prolong the independence of the elderly...
Mitja Lustrek, Bostjan Kaluza, Erik Dovgan, Bogdan...
CIKM
2009
Springer
14 years 4 months ago
(Not) yet another matcher
Discovering correspondences between schema elements is a crucial task for data integration. Most schema matching tools are semiautomatic, e.g. an expert must tune some parameters ...
Fabien Duchateau, Remi Coletta, Zohra Bellahsene, ...