Sciweavers

357 search results - page 42 / 72
» Enhanced sharing analysis techniques: a comprehensive evalua...
Sort
View
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
12 years 11 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
ICDCS
2002
IEEE
14 years 20 days ago
Improving Search in Peer-to-Peer Networks
Peer-to-peer systems have emerged as a popular way to share huge volumes of data. The usability of these systems depends on effective techniques to find and retrieve data; howeve...
Beverly Yang, Hector Garcia-Molina
CVPR
2006
IEEE
13 years 11 months ago
Separation of Highlight Reflections on Textured Surfaces
We present a method for separating highlight reflections on textured surfaces. In contrast to previous techniques that use diffuse color information from outside the highlight are...
Ping Tan, Long Quan, Stephen Lin
COMPLEX
2009
Springer
13 years 11 months ago
Inter-Profile Similarity (IPS): A Method for Semantic Analysis of Online Social Networks
Online Social Networks (OSN) are experiencing an explosive growth rate and are becoming an increasingly important part of people's lives. There is an increasing desire to aid ...
Matt Spear, Xiaoming Lu, Norman S. Matloff, Shyhts...
SEKE
2007
Springer
14 years 1 months ago
Adjudicator: A Statistical Approach for Learning Ontology Concepts from Peer Agents
— We present a statistical approach for software agents to learn ontology concepts from peer agents by asking them whether they can reach consensus on significant differences bet...
Behrouz Homayoun Far, Abdel Halim Elamy, Nora Houa...