Sciweavers

7380 search results - page 1407 / 1476
» time 2008
Sort
View
CIVR
2009
Springer
132views Image Analysis» more  CIVR 2009»
15 years 10 months ago
Real-time bag of words, approximately
We start from the state-of-the-art Bag of Words pipeline that in the 2008 benchmarks of TRECvid and PASCAL yielded the best performance scores. We have contributed to that pipelin...
Jasper R. R. Uijlings, Arnold W. M. Smeulders, Rem...
129
Voted
ICB
2009
Springer
167views Biometrics» more  ICB 2009»
15 years 10 months ago
Partial Face Matching between Near Infrared and Visual Images in MBGC Portal Challenge
The latest multi-biometric grand challenge (MBGC 2008) sets up a new experiment in which near infrared (NIR) face videos containing partial faces are used as a probe set and the vi...
Dong Yi, ShengCai Liao, Zhen Lei, Jitao Sang, Stan...
SIGCOMM
2009
ACM
15 years 10 months ago
Hot today, gone tomorrow: on the migration of MySpace users
While some empirical studies on Online Social Networks (OSNs) have examined the growth of these systems, little is known about the patterns of decline in user population or user a...
Mojtaba Torkjazi, Reza Rejaie, Walter Willinger
119
Voted
ACSAC
2008
IEEE
15 years 10 months ago
New Side Channels Targeted at Passwords
Side channels are typically viewed as attacks that leak cryptographic keys during cryptographic algorithm processing, by observation of system side effects. In this paper, we pres...
Albert Tannous, Jonathan T. Trostle, Mohamed Hassa...
139
Voted
ACSAC
2008
IEEE
15 years 10 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
« Prev « First page 1407 / 1476 Last » Next »