Sciweavers

1441 search results - page 228 / 289
» Multiple instance ranking
Sort
View
IWSOS
2007
Springer
14 years 4 months ago
Collaborative Anomaly-Based Attack Detection
Today networks suffer from various challenges like distributed denial of service attacks or worms. Multiple different anomaly-based detection systems try to detect and counter such...
Thomas Gamer, Michael Scharf, Marcus Schöller
MIDDLEWARE
2007
Springer
14 years 4 months ago
Using checkpointing to recover from poor multi-site parallel job scheduling decisions
Recent research in multi-site parallel job scheduling leverages user-provided estimates of job communication characteristics to effectively partition the job across multiple clus...
William M. Jones
VOTEID
2007
Springer
14 years 4 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
WEBI
2007
Springer
14 years 4 months ago
K-SVMeans: A Hybrid Clustering Algorithm for Multi-Type Interrelated Datasets
Identification of distinct clusters of documents in text collections has traditionally been addressed by making the assumption that the data instances can only be represented by ...
Levent Bolelli, Seyda Ertekin, Ding Zhou, C. Lee G...
CVPR
2006
IEEE
14 years 3 months ago
Depth from Familiar Objects: A Hierarchical Model for 3D Scenes
We develop an integrated, probabilistic model for the appearance and three-dimensional geometry of cluttered scenes. Object categories are modeled via distributions over the 3D lo...
Erik B. Sudderth, Antonio B. Torralba, William T. ...