Sciweavers

571 search results - page 80 / 115
» One person labels one million images
Sort
View
IMC
2010
ACM
13 years 6 months ago
What happened in my network: mining network events from router syslogs
Router syslogs are messages that a router logs to describe a wide range of events observed by it. They are considered one of the most valuable data sources for monitoring network ...
Tongqing Qiu, Zihui Ge, Dan Pei, Jia Wang, Jun Xu
PAISI
2010
Springer
13 years 6 months ago
Efficient Privacy Preserving K-Means Clustering
Abstract. This paper introduces an efficient privacy-preserving protocol for distributed K-means clustering over an arbitrary partitioned data, shared among N parties. Clustering i...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
ISSTA
2012
ACM
11 years 11 months ago
A quantitative study of accuracy in system call-based malware detection
Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been propos...
Davide Canali, Andrea Lanzi, Davide Balzarotti, Ch...
MM
2009
ACM
199views Multimedia» more  MM 2009»
14 years 3 months ago
Visual query suggestion
Query suggestion is an effective approach to improve the usability of image search. Most existing search engines are able to automatically suggest a list of textual query terms b...
Zheng-Jun Zha, Linjun Yang, Tao Mei, Meng Wang, Ze...
ACHI
2009
IEEE
14 years 3 months ago
Machine-Generated Multimedia Content
In this paper we describe an automated system, and its attendant set of techniques and tools, that is able to generate novel multimedia experiences. Using existing online sources,...
Nathan D. Nichols, Kristian J. Hammond