Sciweavers

252 search results - page 41 / 51
» Experimenting with Server-Aided Signatures
Sort
View
KDD
2004
ACM
145views Data Mining» more  KDD 2004»
14 years 26 days ago
A graph-theoretic approach to extract storylines from search results
We present a graph-theoretic approach to discover storylines from search results. Storylines are windows that offer glimpses into interesting themes latent among the top search re...
Ravi Kumar, Uma Mahadevan, D. Sivakumar
WWIC
2010
Springer
193views Communications» more  WWIC 2010»
13 years 11 months ago
0day Anomaly Detection Made Possible Thanks to Machine Learning
Abstract. This paper proposes new cognitive algorithms and mechanisms for detecting 0day attacks targeting the Internet and its communication performances and behavior. For this pu...
Philippe Owezarski, Johan Mazel, Yann Labit
DAS
2006
Springer
13 years 11 months ago
Writer Identification for Smart Meeting Room Systems
Abstract. In this paper we present a text independent on-line writer identification system based on Gaussian Mixture Models (GMMs). This system has been developed in the context of...
Marcus Liwicki, Andreas Schlapbach, Horst Bunke, S...
ADBIS
2003
Springer
204views Database» more  ADBIS 2003»
13 years 11 months ago
Hierarchical Bitmap Index: An Efficient and Scalable Indexing Technique for Set-Valued Attributes
Abstract. Set-valued attributes are convenient to model complex objects occurring in the real world. Currently available database systems support the storage of set-valued attribut...
Mikolaj Morzy, Tadeusz Morzy, Alexandros Nanopoulo...
CARDIS
2008
Springer
165views Hardware» more  CARDIS 2008»
13 years 9 months ago
Malicious Code on Java Card Smartcards: Attacks and Countermeasures
When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens u...
Wojciech Mostowski, Erik Poll