Sciweavers

20831 search results - page 4146 / 4167
» Quantum Computation and Information
Sort
View
P2P
2010
IEEE
132views Communications» more  P2P 2010»
13 years 6 months ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers â...
Yanbin Lu, Gene Tsudik
PAMI
2010
351views more  PAMI 2010»
13 years 6 months ago
Evaluating Color Descriptors for Object and Scene Recognition
—Image category recognition is important to access visual information on the level of objects and scene types. So far, intensity-based descriptors have been widely used for featu...
Koen E. A. van de Sande, Theo Gevers, Cees G. M. S...
SACMAT
2010
ACM
13 years 6 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
SADM
2010
128views more  SADM 2010»
13 years 6 months ago
Online training on a budget of support vector machines using twin prototypes
: This paper proposes twin prototype support vector machine (TVM), a constant space and sublinear time support vector machine (SVM) algorithm for online learning. TVM achieves its ...
Zhuang Wang, Slobodan Vucetic
SIGOPS
2010
162views more  SIGOPS 2010»
13 years 6 months ago
Visual and algorithmic tooling for system trace analysis: a case study
Despite advances in the application of automated statistical and machine learning techniques to system log and trace data there will always be a need for human analysis of machine...
Wim De Pauw, Steve Heisig
« Prev « First page 4146 / 4167 Last » Next »