Sciweavers

888 search results - page 90 / 178
» Digital detective - Bluetooth
Sort
View
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
14 years 10 months ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...
ANCS
2006
ACM
14 years 4 months ago
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms
The fast spreading worm is becoming one of the most serious threats to today’s networked information systems. A fast spreading worm could infect hundreds of thousands of hosts w...
Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang
IMC
2006
ACM
14 years 4 months ago
Approximate fingerprinting to accelerate pattern matching
Pattern matching and analysis over network data streams is increasingly becoming an essential primitive of network monitoring systems. It is a fundamental part of most intrusion d...
Ramaswamy Ramaswamy, Lukas Kencl, Gianluca Iannacc...
MIR
2004
ACM
101views Multimedia» more  MIR 2004»
14 years 3 months ago
Leveraging face recognition technology to find and organize photos
With digital still cameras, users can easily collect thousands of photos. We have created a photo management application with the goal of making photo organization and browsing si...
Andreas Girgensohn, John Adcock, Lynn Wilcox
ICPR
2000
IEEE
14 years 11 months ago
Robust Extraction of Text in Video
Despite advances in the archiving of digital video, we are still unable to efficiently search and retrieve the portions that interest us. Video indexing by shot segmentation has b...
Sameer Antani, David J. Crandall, Rangachar Kastur...