Sciweavers

758 search results - page 123 / 152
» Coding Exon Detection Using Comparative Sequences
Sort
View
WAPCV
2007
Springer
14 years 5 months ago
Reinforcement Learning for Decision Making in Sequential Visual Attention
The innovation of this work is the provision of a system that learns visual encodings of attention patterns and that enables sequential attention for object detection in real world...
Lucas Paletta, Gerald Fritz
INFOCOM
2007
IEEE
14 years 5 months ago
Many-to-Many Communication: A New Approach for Collaboration in MANETs
—We introduce a collaboration-driven approach to the sharing of the available bandwidth in wireless ad hoc networks, which we call many-to-many cooperation, that allows concurren...
Renato M. de Moraes, Hamid R. Sadjadpour, J. J. Ga...
SIGSOFT
2008
ACM
14 years 11 months ago
Marple: a demand-driven path-sensitive buffer overflow detector
Despite increasing efforts in detecting and managing software security vulnerabilities, the number of security attacks is still rising every year. As software becomes more complex...
Wei Le, Mary Lou Soffa
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
14 years 5 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
TON
2010
152views more  TON 2010»
13 years 9 months ago
1 + N network protection for mesh networks: network coding-based protection using p-cycles
—p-Cycles have been proposed for preprovisioned 1 : N protection in optical mesh networks. Although the protection circuits are preconfigured, the detection of failures and the ...
Ahmed E. Kamal