Sciweavers

1056 search results - page 112 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
ACSAC
2008
IEEE
14 years 4 months ago
XSSDS: Server-Side Detection of Cross-Site Scripting Attacks
Cross-site Scripting (XSS) has emerged to one of the most prevalent type of security vulnerabilities. While the reason for the vulnerability primarily lies on the serverside, the ...
Martin Johns, Björn Engelmann, Joachim Posegg...
BIBM
2008
IEEE
142views Bioinformatics» more  BIBM 2008»
14 years 4 months ago
Using Global Sequence Similarity to Enhance Biological Sequence Labeling
Identifying functionally important sites from biological sequences, formulated as a biological sequence labeling problem, has broad applications ranging from rational drug design ...
Cornelia Caragea, Jivko Sinapov, Drena Dobbs, Vasa...
GLOBECOM
2008
IEEE
14 years 4 months ago
Understanding P2P-TV Systems Through Real Measurements
—In this paper, we consider two popular peer-to-peer TV (P2P-TV) systems: PPLive, one of the today most widely used P2P-TV systems, and Joost, a promising new generation applicat...
Delia Ciullo, Marco Mellia, Michela Meo, Emilio Le...
ICASSP
2008
IEEE
14 years 4 months ago
Localization of multiple speakers based on a two step acoustic map analysis
An interface for distant-talking control of home devices requires the possibility of identifying the positions of multiple users. Acoustic maps, based either on Global Coherence F...
Alessio Brutti, Maurizio Omologo, Piergiorgio Svai...
ICASSP
2008
IEEE
14 years 4 months ago
Modeling the intonation of discourse segments for improved online dialog ACT tagging
Prosody is an important cue for identifying dialog acts. In this paper, we show that modeling the sequence of acousticprosodic values as n-gram features with a maximum entropy mod...
Vivek Kumar Rangarajan Sridhar, Shrikanth Narayana...