Sciweavers

571 search results - page 50 / 115
» Matching Algorithms within a Duplicate Detection System
Sort
View
ACMSE
2009
ACM
15 years 9 months ago
FI-based file access predictor
An algorithm is proposed for the purpose of optimizing the availability of files to an operating system prior to their being required during execution by a running system. This al...
Jinsuk Baek, Paul S. Fisher, Mingyung Kwak
148
Voted
ATAL
2008
Springer
15 years 4 months ago
Multi-agent approach to network intrusion detection
Our demo presents an agent-based intrusion detection system designed for deployment on high-speed backbone networks. The major contribution of the system is the integration of sev...
Martin Rehák, Michal Pechoucek, Pavel Celed...
145
Voted
FECS
2006
113views Education» more  FECS 2006»
15 years 4 months ago
A Lightweight Program Similarity Detection Model using XML and Levenshtein Distance
Program plagiarism is one of the most significant problems in Computer Science education. Most common plagiarism includes modifying comments, reordering statements, and changing v...
Seo-Young Noh, Sangwoo Kim, Cheonyoung Jung
AVBPA
1997
Springer
113views Biometrics» more  AVBPA 1997»
15 years 6 months ago
Generalized Likelihood Ratio-based Face Detection and Extraction of Mouth Features
In this paper we describe a system to reliably localize the position of the speaker’s face and mouth in videophone sequences. A statistical scheme based on a subspace method is p...
Charles Kervrann, Franck Davoine, P. Pérez,...
149
Voted
SEKE
2010
Springer
15 years 1 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li