Sciweavers

7891 search results - page 1489 / 1579
» Local Area Networking
Sort
View
LISA
2001
13 years 11 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
UAI
2004
13 years 11 months ago
Dependent Dirichlet Priors and Optimal Linear Estimators for Belief Net Parameters
A Bayesian belief network is a model of a joint distribution over a finite set of variables, with a DAG structure representing immediate dependencies among the variables. For each...
Peter Hooper
ICMAS
2000
13 years 11 months ago
Assessing Usage Patterns to Improve Data Allocation via Auctions
The data allocation problem in incomplete information environments consisting of self-motivated servers responding to users' queries is considered. Periodically, the servers ...
Rina Azoulay-Schwartz, Sarit Kraus
BMVC
1997
13 years 11 months ago
Employing Region Features for Searching an Image Database
This paper describes recent work on the use of regional data extracted from segmented images for use as search keys in an image database query system. The motivation for this work...
Matthew E. J. Wood, Neill W. Campbell, Barry T. Th...
WEBNET
1998
13 years 11 months ago
Using Metadata to Improve Organization and Information Retrieval on the WWW
: Until now the growing volume of heterogeneous and distributed information on the WWW makes increasingly difficult for the existing tools to retrieve relevant information. To impr...
Bich-Liên Doan, Michel Beigbeder, Jean-Jacqu...
« Prev « First page 1489 / 1579 Last » Next »