Sciweavers

4181 search results - page 660 / 837
» Evaluating Usefulness for Dynamic Classification
Sort
View
JMLR
2006
113views more  JMLR 2006»
15 years 2 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
151
Voted
BMCBI
2004
144views more  BMCBI 2004»
15 years 2 months ago
GOtcha: a new method for prediction of protein function assessed by the annotation of seven genomes
Background: The function of a novel gene product is typically predicted by transitive assignment of annotation from similar sequences. We describe a novel method, GOtcha, for pred...
David M. A. Martin, Matthew Berriman, Geoffrey J. ...
123
Voted
BMVC
2010
15 years 18 days ago
Automatic annotation of unique locations from video and text
Given a video and associated text, we propose an automatic annotation scheme in which we employ a latent topic model to generate topic distributions from weighted text and then mo...
Chris Engels, Koen Deschacht, Jan Hendrik Becker, ...
140
Voted
CCS
2010
ACM
15 years 18 days ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
180
Voted
ICCV
2009
IEEE
15 years 9 days ago
Selection and context for action recognition
Recognizing human action in non-instrumented video is a challenging task not only because of the variability produced by general scene factors like illumination, background, occlu...
Dong Han, Liefeng Bo, Cristian Sminchisescu