Sciweavers

12459 search results - page 2402 / 2492
» cans 2006
Sort
View
AI50
2006
14 years 24 days ago
Fifty Years of AI: From Symbols to Embodiment - and Back
There are many stories to tell about the first fifty years of AI. One story is about AI as one of the big forces of innovation in information technology. It is now forgotten that i...
Luc Steels
AMR
2006
Springer
108views Multimedia» more  AMR 2006»
14 years 24 days ago
Variation of Relevance Assessments for Medical Image Retrieval
Abstract. Evaluation is crucial for the success of most research domains, and image retrieval is no exception to this. Recently, several benchmarks have been developed for visual i...
Henning Müller, Paul Clough, William R. Hersh...
ANCS
2006
ACM
14 years 24 days ago
Efficient memory utilization on network processors for deep packet inspection
Deep Packet Inspection (DPI) refers to examining both packet header and payload to look for predefined patterns, which is essential for network security, intrusion detection and c...
Piti Piyachon, Yan Luo
APNOMS
2006
Springer
14 years 24 days ago
"P4L": A Four Layers P2P Model for Optimizing Resources Discovery and Localization
Peer-to-Peer systems are based on the concept of resources localization and mutualization in dynamic context. In specific environment such as mobile networks, characterized by high...
Mourad Amad, Ahmed Meddahi
ASIACRYPT
2006
Springer
14 years 24 days ago
New Guess-and-Determine Attack on the Self-Shrinking Generator
We propose a new type of guess-and-determine attack on the self-shrinking generator (SSG). The inherent flexibility of the new attack enables us to deal with different attack condi...
Bin Zhang, Dengguo Feng
« Prev « First page 2402 / 2492 Last » Next »