Sciweavers

1178 search results - page 231 / 236
» Face Boundary Extraction
Sort
View
ANCS
2007
ACM
14 years 1 months ago
A programmable message classification engine for session initiation protocol (SIP)
Session Initiation Protocol (SIP) has begun to be widely deployed for multiple services such as VoIP, Instant Messaging and Presence. Each of these services uses different SIP mes...
Arup Acharya, Xiping Wang, Charles Wright
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
14 years 1 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
ASIACRYPT
2006
Springer
14 years 1 months ago
Secure Sketch for Biometric Templates
There have been active discussions on how to derive a consistent cryptographic key from noisy data such as biometric templates, with the help of some extra information called a ske...
Qiming Li, Yagiz Sutcu, Nasir D. Memon
AAAI
2008
14 years 4 days ago
Unknown Rewards in Finite-Horizon Domains
"Human computation" is a recent approach that extracts information from large numbers of Web users. reCAPTCHA is a human computation project that improves the process of...
Colin McMillen, Manuela M. Veloso
ASMTA
2008
Springer
167views Mathematics» more  ASMTA 2008»
13 years 11 months ago
Perfect Simulation of Stochastic Automata Networks
The solution of continuous and discrete-time Markovian models is still challenging mainly when we model large complex systems, for example, to obtain performance indexes of paralle...
Paulo Fernandes, Jean-Marc Vincent, Thais Webber