Sciweavers

1036 search results - page 159 / 208
» Evaluating Mixed-Initiative Systems: An Experimental Approac...
Sort
View
BROADNETS
2007
IEEE
14 years 5 months ago
Strategic deployment of network monitors for attack attribution
—Attacks launched over the Internet have become a pressing problem. Attackers make use of a variety of techniques to anonymize their traffic, in order to escape detection and pr...
Young June Pyun, Douglas S. Reeves
IPPS
2007
IEEE
14 years 5 months ago
A Landmark-based Index Architecture for General Similarity Search in Peer-to-Peer Networks
The indexing of complex data and similarity search plays an important role in many application areas. Traditional centralized index structure can not scale with the rapid prolifer...
Xiaoyu Yang, Yiming Hu
3DPVT
2006
IEEE
203views Visualization» more  3DPVT 2006»
14 years 5 months ago
A Spatio-Temporal Modeling Method for Shape Representation
The spherical harmonic (SPHARM) description is a powerful surface modeling technique that can model arbitrarily shaped but simply connected three dimensional (3D) objects. Because...
Heng Huang, Li Shen, Rong Zhang, Fillia Makedon, J...
COMSWARE
2006
IEEE
14 years 5 months ago
Utilizing network features for privacy violation detection
Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have be...
Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor,...
ICMCS
2006
IEEE
159views Multimedia» more  ICMCS 2006»
14 years 5 months ago
Improving Speaker Diarization by Cross EM Refinement
In this paper, we present a new speaker diarization system that improves the accuracy of traditional hierarchical clustering-based methods with little increase in computational co...
Huazhong Ning, Wei Xu, Yihong Gong, Thomas S. Huan...