Sciweavers

134 search results - page 22 / 27
» Weakly Monotonic Propagators
Sort
View
IWAN
2004
Springer
14 years 1 months ago
Distributed Instrusion Prevention in Active and Extensible Networks
The proliferation of computer viruses and Internet worms has had a major impact on the Internet Community. Cleanup and control of malicious software (malware) has become a key prob...
Todd S. Sproull, John W. Lockwood
CP
2003
Springer
14 years 28 days ago
A Synthesis of Constraint Satisfaction and Constraint Solving
Abstract. This paper offers a critique of the framework of Constraint Satisfaction Problems. While this framework has been successful in studying search techniques, and has inspire...
Michael J. Maher
CIVR
2010
Springer
299views Image Analysis» more  CIVR 2010»
13 years 10 months ago
Co-reranking by mutual reinforcement for image search
Most existing reranking approaches to image search focus solely on mining "visual" cues within the initial search results. However, the visual information cannot always ...
Ting Yao, Tao Mei, Chong-Wah Ngo
USENIX
2008
13 years 10 months ago
ConfiDNS: Leveraging Scale and History to Detect Compromise
While cooperative DNS resolver systems, such as CoDNS, have demonstrated improved reliability and performance over standard approaches, their security has been weaker, since any c...
Lindsey Poole, Vivek S. Pai
COLING
2000
13 years 9 months ago
XML and Multilingual Document Authoring: Convergent Trends
Typical approaches to XML authoring view a XML document as a mixture of structure (the tags) and surface (text between the tags). We advocate a radical approach where the surface ...
Marc Dymetman, Veronika Lux, Aarne Ranta