Sciweavers

264 search results - page 39 / 53
» New Issues in Near-duplicate Detection
Sort
View
CCS
2010
ACM
13 years 7 months ago
Symbolic security analysis of ruby-on-rails web applications
Many of today's web applications are built on frameworks that include sophisticated defenses against malicious adversaries. However, mistakes in the way developers deploy tho...
Avik Chaudhuri, Jeffrey S. Foster
COMCOM
2006
87views more  COMCOM 2006»
13 years 7 months ago
Practical utilities for monitoring multicast service availability
Monitoring has become one of the key issues for the successful deployment of IP multicast in the Internet. During the last decade, several tools and systems have been developed to ...
Pavan Namburi, Kamil Saraç, Kevin C. Almero...
GLOBECOM
2010
IEEE
13 years 5 months ago
Finding and Mending Barrier Gaps in Wireless Sensor Networks
Constructing sensing barriers using wireless sensor networks has important applications in military operations and homeland security. The goal of forming a sensing barrier is to de...
Anwar Saipulla, Benyuan Liu, Jie Wang
ISBI
2006
IEEE
14 years 8 months ago
Modeling and measurement of elastic laminae in arteries
Analysis of elastic laminae provides vital information on both the gross and fine structures of the arterial wall, which is vital to assess issues such as mechanical damage caused...
Hai Xu, Jin-Jia Hu, Jay D. Humphrey, Jyh-Charn Liu
EDBT
2004
ACM
94views Database» more  EDBT 2004»
14 years 7 months ago
Mining Extremely Skewed Trading Anomalies
Trading surveillance systems screen and detect anomalous trades of equity, bonds, mortgage certificates among others. This is to satisfy federal trading regulations as well as to p...
Wei Fan, Philip S. Yu, Haixun Wang