Sciweavers

87 search results - page 7 / 18
» Using Delay to Defend Against Database Extraction
Sort
View
ICASSP
2007
IEEE
13 years 11 months ago
Texture Classification by using Advanced Local Binary Patterns and Spatial Distribution of Dominant Patterns
In this paper, we propose a new feature extraction method, which is robust against rotation and histogram equalization for texture classification. To this end, we introduce the co...
Shu Liao, Albert C. S. Chung
SIGIR
2009
ACM
14 years 2 months ago
Extracting structured information from user queries with semi-supervised conditional random fields
When search is against structured documents, it is beneficial to extract information from user queries in a format that is consistent with the backend data structure. As one step...
Xiao Li, Ye-Yi Wang, Alex Acero
JASIS
2006
90views more  JASIS 2006»
13 years 7 months ago
Can scientific journals be classified in terms of aggregated journal-journal citation relations using the Journal Citation Repor
The aggregated citation relations among journals included in the Science Citation Index provide us with a huge matrix which can be analyzed in various ways. Using principal compon...
Loet Leydesdorff
APPINF
2003
13 years 9 months ago
Fast Frequent Itemset Mining using Compressed Data Representation
Discovering association rules by identifying relationships among sets of items in a transaction database is an important problem in Data Mining. Finding frequent itemsets is compu...
Raj P. Gopalan, Yudho Giri Sucahyo
IJSN
2007
129views more  IJSN 2007»
13 years 7 months ago
Single packet IP traceback in AS-level partial deployment scenario
Tracing IP packets to their sources, known as IP traceback, is an important task in defending against IP spoofing and DoS attacks. Log-based IP traceback technique is to log pack...
Turgay Korkmaz, Chao Gong, Kamil Saraç, San...