Sciweavers

8614 search results - page 1500 / 1723
» Mining
Sort
View
129
Voted
DASC
2006
IEEE
15 years 9 months ago
Assessing Vulnerabilities in Apache and IIS HTTP Servers
We examine the feasibility of quantitatively characterizing the vulnerabilities in the two major HTTP servers. In particular, we investigate the applicability of quantitative empi...
Sung-Whan Woo, Omar H. Alhazmi, Yashwant K. Malaiy...
115
Voted
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
15 years 9 months ago
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace
Gatekeeping/Information Control is exercised frequently and daily in virtual communities. Gatekeeping exists in four different levels: Regulators, service providers, communitiesâ€...
Karine Barzilai-Nahon
134
Voted
ICDCS
2006
IEEE
15 years 9 months ago
Adaptive Control of Extreme-scale Stream Processing Systems
Abstract— Distributed stream processing systems offer a highly scalable and dynamically conïŹgurable platform for time-critical applications ranging from real-time, exploratory ...
Lisa Amini, Navendu Jain, Anshul Sehgal, Jeremy Si...
ICDIM
2006
IEEE
15 years 9 months ago
Investigating Web-Based Approaches to Revealing Prototypical Music Artists in Genre Taxonomies
— We present three general approaches to detecting prototypical entities in a given taxonomy and apply them to a music information retrieval (MIR) problem. More precisely, we try...
Markus Schedl, Peter Knees, Gerhard Widmer
123
Voted
ICMCS
2006
IEEE
157views Multimedia» more  ICMCS 2006»
15 years 9 months ago
RD-Optimization for MPEG-2 to H.264 Transcoding
1 In this paper, we introduce and evaluate a low complexity macroblock partition mode decision algorithm for interframe prediction in MPEG-2 to H.264 transcoder. The proposed tools...
Gerardo Fernández-Escribano, Hari Kalva, Pe...
« Prev « First page 1500 / 1723 Last » Next »