Sciweavers

1993 search results - page 294 / 399
» On Action Theory Change
Sort
View
SP
2006
IEEE
14 years 4 months ago
Locating Hidden Servers
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Wit...
Lasse Øverlier, Paul F. Syverson
MM
2006
ACM
148views Multimedia» more  MM 2006»
14 years 4 months ago
Audio similarity measure by graph modeling and matching
This paper proposes a new approach for the similarity measure and ranking of audio clips by graph modeling and matching. Instead of using frame-based or salient-based features to ...
Yuxin Peng, Chong-Wah Ngo, Cuihua Fang, Xiaoou Che...
INFOCOM
2005
IEEE
14 years 3 months ago
A study of analyzing network traffic as images in real-time
—This paper presents NetViewer, a network measurement approach that can simultaneously detect, identify and visualize attacks and anomalous traffic in real-time by passively moni...
Seong Soo Kim, A. L. Narasimha Reddy
ECAI
2004
Springer
14 years 3 months ago
A Backtracking Strategy for Order-Independent Incremental Learning
Agents that exist in an environment that changes over time, and are able to take into account the temporal nature of experience, are commonly called incremental learners. It is wid...
Nicola Di Mauro, Floriana Esposito, Stefano Ferill...
OTM
2004
Springer
14 years 3 months ago
Revising and Managing Multiple Ontology Versions in a Possible Worlds Setting
Abstract. To date, ontology research seems to have come to an equilibrium: there is a wide variety of theories, methods and tools for extracting, representing, storing and browsing...
Pieter De Leenheer