Sciweavers

518 search results - page 41 / 104
» Client Side Personalization
Sort
View
ICASSP
2010
IEEE
13 years 7 months ago
A nonnegative sparsity induced similarity measure with application to cluster analysis of spam images
Image spam is an email spam that embeds text content into graphical images to bypass traditional spam filters. The majority of previous approaches focus on filtering image spam ...
Yan Gao, Alok N. Choudhary, Gang Hua
MTA
2006
93views more  MTA 2006»
13 years 7 months ago
A multi-threshold online smoothing technique for variable rate multimedia streams
Variable bit rate (VBR) compression for media streams allocates more bits to complex scenes and fewer bits to simple scenes. This results in a higher and more uniform visual and au...
Roger Zimmermann, Cyrus Shahabi, Kun Fu, Mehrdad J...
ICST
2011
IEEE
12 years 11 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
BIOID
2008
134views Biometrics» more  BIOID 2008»
13 years 9 months ago
Advanced Studies on Reproducibility of Biometric Hashes
The determination of hashes based on biometric data is a recent topic in biometrics as it allows to handle biometric templates in a privacy manner. Applications could be the genera...
Tobias Scheidat, Claus Vielhauer, Jana Dittmann
SPAA
2009
ACM
14 years 8 months ago
Speed scaling of processes with arbitrary speedup curves on a multiprocessor
We consider the setting of a multiprocessor where the speeds of the m processors can be individually scaled. Jobs arrive over time and have varying degrees of parallelizability. A...
Ho-Leung Chan, Jeff Edmonds, Kirk Pruhs