Sciweavers

6656 search results - page 1262 / 1332
» Change, Change, Change: Three Approaches
Sort
View
ICDM
2006
IEEE
176views Data Mining» more  ICDM 2006»
14 years 3 months ago
Razor: mining distance-constrained embedded subtrees
Due to their capability for expressing semantics and relationships among data objects, semi-structured documents have become a common way of representing domain knowledge. Compari...
Henry Tan, Tharam S. Dillon, Fedja Hadzic, Elizabe...
IEEEPACT
2006
IEEE
14 years 2 months ago
Complexity-based program phase analysis and classification
Modeling and analysis of program behavior are at the foundation of computer system design and optimization. As computer systems become more adaptive, their efficiency increasingly...
Chang-Burm Cho, Tao Li
INFOCOM
2006
IEEE
14 years 2 months ago
Design and Evaluation of a Fast and Robust Worm Detection Algorithm
— Fast spreading worms are a reality, as amply demonstrated by worms such as Slammer, which reached its peak propagation in a matter of minutes. With these kinds of fast spreadin...
Tian Bu, Aiyou Chen, Scott A. Vander Wiel, Thomas ...
ISMAR
2006
IEEE
14 years 2 months ago
Online camera pose estimation in partially known and dynamic scenes
One of the key requirements of augmented reality systems is a robust real-time camera pose estimation. In this paper we present a robust approach, which does neither depend on ofï...
Gabriele Bleser, Harald Wuest, Didier Stricker
SECPERU
2006
IEEE
14 years 2 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
« Prev « First page 1262 / 1332 Last » Next »