Sciweavers

3883 search results - page 723 / 777
» Design mentoring based on design evolution analysis
Sort
View
CCS
2003
ACM
14 years 28 days ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
SIGMOD
2010
ACM
250views Database» more  SIGMOD 2010»
14 years 15 days ago
Spreadsheet as a relational database engine
Spreadsheets are among the most commonly used applications for data management and analysis. Perhaps they are even among the most widely used computer applications of all kinds. H...
Jerzy Tyszkiewicz
CIVR
2010
Springer
199views Image Analysis» more  CIVR 2010»
14 years 15 days ago
Unsupervised multi-feature tag relevance learning for social image retrieval
Interpreting the relevance of a user-contributed tag with respect to the visual content of an image is an emerging problem in social image retrieval. In the literature this proble...
Xirong Li, Cees G. M. Snoek, Marcel Worring
EUROGP
2009
Springer
105views Optimization» more  EUROGP 2009»
14 years 9 days ago
Quantum Circuit Synthesis with Adaptive Parameters Control
The contribution presented herein proposes an adaptive genetic algorithm applied to quantum logic circuit synthesis that, dynamically adjusts its control parameters. The adaptation...
Cristian Ruican, Mihai Udrescu, Lucian Prodan, Mir...
GIS
2009
ACM
14 years 9 days ago
REG^2: a regional regression framework for geo-referenced datasets
Traditional regression analysis derives global relationships between variables and neglects spatial variations in variables. Hence they lack the ability to systematically discover...
Oner Ulvi Celepcikay, Christoph F. Eick