Sciweavers

7984 search results - page 1504 / 1597
» Exploring personal information
Sort
View
IMC
2006
ACM
14 years 4 months ago
Malware prevalence in the KaZaA file-sharing network
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation vector. Disguised as files that are frequently exchan...
Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan
IMC
2007
ACM
13 years 11 months ago
I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system
User Generated Content (UGC) is re-shaping the way people watch video and TV, with millions of video producers and consumers. In particular, UGC sites are creating new viewing pat...
Meeyoung Cha, Haewoon Kwak, Pablo Rodriguez, Yong-...
PODC
2012
ACM
12 years 14 days ago
Weak models of distributed computing, with connections to modal logic
This work presents a classification of weak models of distributed computing. We focus on deterministic distributed algorithms, and we study models of computing that are weaker ve...
Lauri Hella, Matti Järvisalo, Antti Kuusisto,...
CVPR
2008
IEEE
15 years 2 days ago
Semi-supervised distance metric learning for Collaborative Image Retrieval
Typical content-based image retrieval (CBIR) solutions with regular Euclidean metric usually cannot achieve satisfactory performance due to the semantic gap challenge. Hence, rele...
Steven C. H. Hoi, Wei Liu, Shih-Fu Chang
CVPR
2008
IEEE
15 years 2 days ago
Unifying discriminative visual codebook generation with classifier training for object category recognition
The idea of representing images using a bag of visual words is currently popular in object category recognition. Since this representation is typically constructed using unsupervi...
Liu Yang, Rong Jin, Rahul Sukthankar, Fréd&...
« Prev « First page 1504 / 1597 Last » Next »