Sciweavers

2467 search results - page 486 / 494
» Finite State Machines
Sort
View
ACSW
2006
14 years 8 days ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
DGO
2006
136views Education» more  DGO 2006»
14 years 7 days ago
Automated classification of congressional legislation
For social science researchers, content analysis and classification of United States Congressional legislative activities has been time consuming and costly. The Library of Congre...
Stephen Purpura, Dustin Hillard
NIPS
1998
14 years 6 days ago
An Entropic Estimator for Structure Discovery
We introduce a novel framework for simultaneous structure and parameter learning in hidden-variable conditional probability models, based on an entropic prior and a solution for i...
Matthew Brand
MM
2010
ACM
251views Multimedia» more  MM 2010»
13 years 11 months ago
A cognitive approach for effective coding and transmission of 3D video
Reliable delivery of 3D video contents to a wide set of users is expected to be the next big revolution in multimedia applications provided that it is possible to grant a certain ...
Simone Milani, Giancarlo Calvagno
BMCBI
2010
143views more  BMCBI 2010»
13 years 11 months ago
Learning gene regulatory networks from only positive and unlabeled data
Background: Recently, supervised learning methods have been exploited to reconstruct gene regulatory networks from gene expression data. The reconstruction of a network is modeled...
Luigi Cerulo, Charles Elkan, Michele Ceccarelli