Sciweavers

264 search results - page 18 / 53
» New Issues in Near-duplicate Detection
Sort
View
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
12 years 11 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
ICCV
2011
IEEE
12 years 7 months ago
Segmentation from a Box
Drawing a box around an intended segmentation target has become both a popular user interface and a common output for learning-driven detection algorithms. Despite the ubiquity of...
Leo Grady, Marie-Pierre Jolly, Aaron Seitz
VEE
2012
ACM
215views Virtualization» more  VEE 2012»
12 years 3 months ago
SecondSite: disaster tolerance as a service
This paper describes the design and implementation of SecondSite, a cloud-based service for disaster tolerance. SecondSite extends the Remus virtualization-based high availability...
Shriram Rajagopalan, Brendan Cully, Ryan O'Connor,...
PRESENCE
2007
119views more  PRESENCE 2007»
13 years 7 months ago
Gaze-Contingent Visual Presentation Based on Remote Saccade Detection
Pursuing new display techniques based on insights into human visual perception can reveal new possibilities for visual information devices. Here, we propose a novel information pr...
Junji Watanabe, Hideyuki Ando, Taro Maeda, Susumu ...
CIKM
2003
Springer
14 years 26 days ago
Online duplicate document detection: signature reliability in a dynamic retrieval environment
As online document collections continue to expand, both on the Web and in proprietary environments, the need for duplicate detection becomes more critical. Few users wish to retri...
Jack G. Conrad, Xi S. Guo, Cindy P. Schriber