Sciweavers

31686 search results - page 6277 / 6338
» Resource typing in Guru
Sort
View
SISAP
2010
IEEE
259views Data Mining» more  SISAP 2010»
13 years 7 months ago
kNN based image classification relying on local feature similarity
In this paper, we propose a novel image classification approach, derived from the kNN classification strategy, that is particularly suited to be used when classifying images descr...
Giuseppe Amato, Fabrizio Falchi
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 7 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
USS
2010
13 years 7 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
WD
2010
13 years 7 months ago
QoE estimation of a location-based mobile game using on-body sensors and QoS-related data
The scope of this paper is the interdisciplinary measurement and modeling methodology of Quality of Experience (QoE) when playing a mobile location-based massively multiplayer onli...
Adrian Juan Verdejo, Katrien De Moor, Istvan Ketyk...
WIOPT
2010
IEEE
13 years 7 months ago
Routing games : From egoism to altruism
The paper studies the routing in the network shared by several users. Each user seeks to optimize either its own performance or some combination between its own performance and tha...
Amar Prakash Azad, Eitan Altman, Rachid El Azouzi
« Prev « First page 6277 / 6338 Last » Next »