Sciweavers

674 search results - page 61 / 135
» Telephony in the Year 2005
Sort
View
ICDM
2008
IEEE
224views Data Mining» more  ICDM 2008»
14 years 4 months ago
A Non-parametric Approach to Pair-Wise Dynamic Topic Correlation Detection
We introduce dynamic correlated topic models (DCTM) for analyzing discrete data over time. This model is inspired by the hierarchical Gaussian process latent variable models (GP-L...
Yang Song, Lu Zhang 0007, C. Lee Giles
ACSAC
2005
IEEE
14 years 3 months ago
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX
Code injection vulnerabilities continue to prevail. Attacks of this kind such as stack buffer overflows and heap buffer overflows account for roughly half of the vulnerabilities...
Stig Andersson, Andrew Clark, George M. Mohay, Bra...
ACSAC
2005
IEEE
14 years 3 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
AICCSA
2005
IEEE
124views Hardware» more  AICCSA 2005»
14 years 3 months ago
On multicast scheduling and routing in multistage Clos networks
Multicast communication, which involves transmitting information from one node to multiple nodes, is a vital operation in both broadband integrated services digital networks (BISD...
Bin Tang
AICCSA
2005
IEEE
164views Hardware» more  AICCSA 2005»
14 years 3 months ago
Efficient aggregation of delay-constrained data in wireless sensor networks
Recent years have witnessed a growing interest in the application of wireless sensor networks in unattended environments. Nodes in such applications are equipped with limited ener...
Kemal Akkaya, Mohamed F. Younis, Moustafa Youssef