Sciweavers

1862 search results - page 291 / 373
» Constrained pattern matching
Sort
View
168
Voted
CCS
2011
ACM
14 years 2 months ago
MIDeA: a multi-parallel intrusion detection architecture
Network intrusion detection systems are faced with the challenge of identifying diverse attacks, in extremely high speed networks. For this reason, they must operate at multi-Giga...
Giorgos Vasiliadis, Michalis Polychronakis, Sotiri...
98
Voted
CVPR
2007
IEEE
16 years 4 months ago
Recognizing Groceries in situ Using in vitro Training Data
The problem of using pictures of objects captured under ideal imaging conditions (here referred to as in vitro) to recognize objects in natural environments (in situ) is an emergi...
Michele Merler, Carolina Galleguillos, Serge Belon...
237
Voted
SIGMOD
2009
ACM
269views Database» more  SIGMOD 2009»
16 years 2 months ago
Efficient approximate entity extraction with edit distance constraints
Named entity recognition aims at extracting named entities from unstructured text. A recent trend of named entity recognition is finding approximate matches in the text with respe...
Wei Wang 0011, Chuan Xiao, Xuemin Lin, Chengqi Zha...
191
Voted
SIGMOD
2007
ACM
196views Database» more  SIGMOD 2007»
16 years 2 months ago
Adaptive location constraint processing
An important problem for many location-based applications is the continuous evaluation of proximity relations among moving objects. These relations express whether a given set of ...
Zhengdao Xu, Hans-Arno Jacobsen
129
Voted
ISSTA
2009
ACM
15 years 9 months ago
Identifying semantic differences in AspectJ programs
Program differencing is a common means of software debugging. Although many differencing algorithms have been proposed for procedural and object-oriented languages like C and Ja...
Martin Th Görg, Jianjun Zhao