Sciweavers

1056 search results - page 99 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
CN
2006
84views more  CN 2006»
13 years 10 months ago
Distributed mechanism in detecting and defending against the low-rate TCP attack
In this paper, we consider a distributed mechanism to detect and to defend against the low-rate TCP attack. The low-rate TCP attack is a recently discovered attack. In essence, it ...
Haibin Sun, John C. S. Lui, David K. Y. Yau
BMCBI
2005
118views more  BMCBI 2005»
13 years 10 months ago
Vestige: Maximum likelihood phylogenetic footprinting
Background: Phylogenetic footprinting is the identification of functional regions of DNA by their evolutionary conservation. This is achieved by comparing orthologous regions from...
Matthew J. Wakefield, Peter Maxwell, Gavin A. Hutt...
CORR
2010
Springer
121views Education» more  CORR 2010»
13 years 9 months ago
Interference Channel with an Out-of-Band Relay
A Gaussian interference channel (IC) with a relay is considered. The relay is assumed to operate over an orthogonal band with respect to the underlying IC, and the overall system i...
Onur Sahin, Osvaldo Simeone, Elza Erkip
INLG
2010
Springer
13 years 8 months ago
Charting the Potential of Description Logic for the Generation of Referring Expressions
The generation of referring expressions (GRE), an important subtask of Natural Language Generation (NLG) is to generate phrases that uniquely identify domain entities. Until recen...
Yuan Ren, Kees van Deemter, Jeff Z. Pan
CVPR
2009
IEEE
15 years 5 months ago
Actions in context
This paper exploits the context of natural dynamic scenes for human action recognition in video. Human actions are frequently constrained by the purpose and the physical propert...
Marcin Marszalek (INRIA), Ivan Laptev (INRIA), Cor...