Sciweavers

1056 search results - page 20 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
PERCOM
2005
ACM
14 years 7 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
MMM
2010
Springer
230views Multimedia» more  MMM 2010»
14 years 4 months ago
Learning Landmarks by Exploiting Social Media
This paper introduces methods for automatic annotation of landmark photographs via learning textual tags and visual features of landmarks from landmark photographs that are appropr...
Chia-Kai Liang, Yu-Ting Hsieh, Tien-Jung Chuang, Y...
CIKM
2009
Springer
14 years 2 months ago
Exploiting bidirectional links: making spamming detection easier
Previous anti-spamming algorithms based on link structure suffer from either the weakness of the page value metric or the vagueness of the seed selection. In this paper, we propos...
Yan Zhang, Qiancheng Jiang, Lei Zhang, Yizhen Zhu
CCS
2007
ACM
14 years 1 months ago
Asirra: a CAPTCHA that exploits interest-aligned manual image categorization
We present Asirra (Figure 1), a CAPTCHA that asks users to identify cats out of a set of 12 photographs of both cats and dogs. Asirra is easy for users; user studies indicate it c...
Jeremy Elson, John R. Douceur, Jon Howell, Jared S...
CPM
2007
Springer
99views Combinatorics» more  CPM 2007»
14 years 1 months ago
Speeding Up HMM Decoding and Training by Exploiting Sequence Repetitions
We present a method to speed up the dynamic program algorithms used for solving the HMM decoding and training problems for discrete time-independent HMMs. We discuss the applicatio...
Shay Mozes, Oren Weimann, Michal Ziv-Ukelson