Sciweavers

572 search results - page 112 / 115
» Exponential-Time Approximation of Hard Problems
Sort
View
HT
2010
ACM
14 years 2 months ago
Of categorizers and describers: an evaluation of quantitative measures for tagging motivation
While recent research has advanced our understanding about the structure and dynamics of social tagging systems, we know little about (i) the underlying motivations for tagging (w...
Christian Körner, Roman Kern, Hans-Peter Grah...
SIGMETRICS
2010
ACM
214views Hardware» more  SIGMETRICS 2010»
14 years 2 months ago
Distributed sensor network localization from local connectivity: performance analysis for the HOP-TERRAIN algorithm
This paper addresses the problem of determining the node locations in ad-hoc sensor networks when only connectivity information is available. In previous work, we showed that the ...
Amin Karbasi, Sewoong Oh
CCS
2007
ACM
14 years 1 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
CIVR
2010
Springer
427views Image Analysis» more  CIVR 2010»
14 years 1 months ago
An efficient method for face retrieval from large video datasets
The human face is one of the most important objects in videos since it provides rich information for spotting certain people of interest, such as government leaders in news video,...
Thao Ngoc Nguyen, Thanh Duc Ngo, Duy-Dinh Le, Shin...
WEBNET
1996
13 years 11 months ago
Digital Libraries Based on Full-Text Retrieval
: Because digital libraries are expensive to create and maintain, Internet analogs of public libraries--reliable, quality, community services--have only recently begun to appear. A...
Ian H. Witten, Craig G. Nevill-Manning, Sally Jo C...