Sciweavers

162 search results - page 24 / 33
» Predicting and preventing inconsistencies in deployed distri...
Sort
View
BC
1998
117views more  BC 1998»
13 years 7 months ago
Where did I take that snapshot? Scene-based homing by image matching
In homing tasks, the goal is often not marked by visible objects but must be inferred from the spatial relation to the visual cues in the surrounding scene. The exact computation o...
Matthias O. Franz, Bernhard Schölkopf, Hanspe...
KCAP
2003
ACM
14 years 21 days ago
Building large knowledge bases by mass collaboration
Acquiring knowledge has long been the major bottleneck preventing the rapid spread of AI systems. Manual approaches are slow and costly. Machine-learning approaches have limitatio...
Matthew Richardson, Pedro Domingos
SEC
2008
13 years 9 months ago
Collaborative architecture for malware detection and analysis
The constant increase of malware threats clearly shows that the present countermeasures are not sufficient especially because most actions are put in place only when infections hav...
Michele Colajanni, Daniele Gozzi, Mirco Marchetti
COMCOM
2008
91views more  COMCOM 2008»
13 years 7 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
IMC
2010
ACM
13 years 5 months ago
The effect of packet loss on redundancy elimination in cellular wireless networks
Network-level redundancy elimination (RE) algorithms reduce traffic volume on bandwidth-constrained network paths by avoiding the transmission of repeated byte sequences. Previous...
Cristian Lumezanu, Katherine Guo, Neil Spring, Bob...