Sciweavers

2227 search results - page 438 / 446
» Evaluation Measures for TCBR Systems
Sort
View
MM
2004
ACM
86views Multimedia» more  MM 2004»
14 years 24 days ago
Efficient propagation for face annotation in family albums
In this paper, we propose and investigate a new user scenario for face annotation, in which users are allowed to multi-select a group of photographs and assign names to these phot...
Lei Zhang, Yuxiao Hu, Mingjing Li, Wei-Ying Ma, Ho...
SIGCOMM
2004
ACM
14 years 24 days ago
The feasibility of supporting large-scale live streaming applications with dynamic application end-points
While application end-point architectures have proven to be viable solutions for large-scale distributed applications such as distributed computing and file-sharing, there is lit...
Kunwadee Sripanidkulchai, Aditya Ganjam, Bruce M. ...
SIGIR
2004
ACM
14 years 24 days ago
Resource selection for domain-specific cross-lingual IR
An under-explored question in cross-language information retrieval (CLIR) is to what degree the performance of CLIR methods depends on the availability of high-quality translation...
Monica Rogati, Yiming Yang
SIGMETRICS
2004
ACM
105views Hardware» more  SIGMETRICS 2004»
14 years 24 days ago
A model of BGP routing for network engineering
The performance of IP networks depends on a wide variety of dynamic conditions. Traffic shifts, equipment failures, planned maintenance, and topology changes in other parts of th...
Nick Feamster, Jared Winick, Jennifer Rexford
ESORICS
2004
Springer
14 years 23 days ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee