Sciweavers

571 search results - page 62 / 115
» Matching Algorithms within a Duplicate Detection System
Sort
View
CORR
2010
Springer
109views Education» more  CORR 2010»
15 years 2 months ago
Experimenting with Innate Immunity
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...
Jamie Twycross, Uwe Aickelin
124
Voted
ICMCS
2006
IEEE
151views Multimedia» more  ICMCS 2006»
15 years 8 months ago
A Robust Method for TV Logo Tracking in Video Streams
Most broadcast stations rely on TV logos to claim video content ownership or visually distinguish the broadcast from the interrupting commercial block. Detecting and tracking a TV...
Jinqiao Wang, Lingyu Duan, Zhenglong Li, Jing Liu,...
96
Voted
IEEEMSP
2002
IEEE
134views Multimedia» more  IEEEMSP 2002»
15 years 7 months ago
Beat-ID: identifying music via beat analysis
— Music identification is an effective tool that enables multimedia players to extract a distinct statistical digest of the played content, look up into a music database using t...
Darko Kirovski, Hagai Attias
SIGCOMM
2006
ACM
15 years 8 months ago
Detecting evasion attacks at high speeds without reassembly
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
George Varghese, J. Andrew Fingerhut, Flavio Bonom...
COLING
2008
15 years 4 months ago
A Framework for Identifying Textual Redundancy
The task of identifying redundant information in documents that are generated from multiple sources provides a significant challenge for summarization and QA systems. Traditional ...
Kapil Thadani, Kathleen McKeown