Sciweavers

1056 search results - page 115 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
ACSAC
2007
IEEE
14 years 4 months ago
Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms
To combat the rapid infection rate of today’s Internet worms, signatures for novel worms must be generated soon after an outbreak. This is especially critical in the case of pol...
Matthew Van Gundy, Hao Chen, Zhendong Su, Giovanni...
DASFAA
2007
IEEE
297views Database» more  DASFAA 2007»
14 years 4 months ago
OLYBIA: Ontology-Based Automatic Image Annotation System Using Semantic Inference Rules
One of the big issues facing current content-based image retrieval is how to automatically extract the high-level concepts from images. In this paper, we present an efficient syste...
Kyung-Wook Park, Jin-Woo Jeong, Dong-Ho Lee
DEXAW
2007
IEEE
92views Database» more  DEXAW 2007»
14 years 4 months ago
Mapping of heterogeneous schemata, business structures, and terminologies
The current effort to extend the power of information systems by making use of the semantics associated with terms and structures has resulted in a need to establish correspondenc...
Domenico Beneventano, Sabina El Haoum, Daniele Mon...
HICSS
2007
IEEE
119views Biometrics» more  HICSS 2007»
14 years 4 months ago
Collection of U.S. Extremist Online Forums: A Web Mining Approach
Extremists’ exploitation of computer-mediated communications such as online forums has recently gained much attention from academia and the government. However, due to the cover...
Yilu Zhou, Jialun Qin, Guanpi Lai, Hsinchun Chen
ICC
2007
IEEE
119views Communications» more  ICC 2007»
14 years 4 months ago
On Channel State Inference and Prediction Using Observable Variables in 802.11b Network
—Performance of cross-layer protocols that recommend the relay of corrupted packets to higher layers can be improved significantly by accurately inferring/predicting the bit erro...
Shirish S. Karande, Syed A. Khayam, Yongju Cho, Ki...