Sciweavers

1437 search results - page 138 / 288
» Content Extraction Signatures
Sort
View
IMC
2006
ACM
15 years 8 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
ICASSP
2009
IEEE
15 years 9 months ago
ViBE: A powerful random technique to estimate the background in video sequences
Background subtraction is a crucial step in many automatic video content analysis applications. While numerous acceptable techniques have been proposed so far for background extra...
Olivier Barnich, Marc Van Droogenbroeck
SIGIR
2009
ACM
15 years 9 months ago
Web-derived resources for web information retrieval: from conceptual hierarchies to attribute hierarchies
A weakly-supervised extraction method identifies concepts within conceptual hierarchies, at the appropriate level of specificity (e.g., Bank vs. Institution), to which attribute...
Marius Pasca, Enrique Alfonseca
ICIP
2008
IEEE
15 years 9 months ago
On the security of non-forgeable robust hash functions
In many applications, it is often desirable to extract a consistent key from a multimedia object (e.g., an image), even when the object has gone through a noisy channel. For examp...
Qiming Li, Sujoy Roy
ACL
2009
15 years 5 hour ago
Annotating and Recognising Named Entities in Clinical Notes
This paper presents ongoing research in clinical information extraction. This work introduces a new genre of text which are not well-written, noise prone, ungrammatical and with m...
Yefeng Wang