Sciweavers

32 search results - page 4 / 7
» Early Recognition of Encrypted Applications
Sort
View
ACL
1997
13 years 9 months ago
Approximating Context-Free Grammars with a Finite-State Calculus
Although adequate models of human language for syntactic analysis and semantic interpretation are of at least contextfree complexity, for applications such as speech processing in...
Edmund Grimley-Evans
FGR
2008
IEEE
227views Biometrics» more  FGR 2008»
14 years 2 months ago
Ambient intelligence as the bridge to the future of pervasive computing
One prediction about this future of pervasive technology is that people will carry the tools needed to interface with technological resources sprinkled through out the environment...
Christopher Richard Wren, Yuri A. Ivanov
ICC
2008
IEEE
163views Communications» more  ICC 2008»
14 years 2 months ago
A New Replay Attack Against Anonymous Communication Networks
Abstract— Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications on the Internet. In this paper, we present a new class of at...
Ryan Pries, Wei Yu, Xinwen Fu, Wei Zhao
HUC
2010
Springer
13 years 7 months ago
Social sensing for epidemiological behavior change
An important question in behavioral epidemiology and public health is to understand how individual behavior is affected by illness and stress. Although changes in individual behav...
Anmol Madan, Manuel Cebrián, David Lazer, A...
MCS
2002
Springer
13 years 7 months ago
Multiclassifier Systems: Back to the Future
Abstract. While a variety of multiple classifier systems have been studied since at least the late 1950's, this area came alive in the 90's with significant theoretical a...
Joydeep Ghosh