Sciweavers

238 search results - page 48 / 48
» The Effects of Algorithmic Diversity on Anomaly Detector Per...
Sort
View
MM
2006
ACM
175views Multimedia» more  MM 2006»
13 years 12 months ago
Diversifying the image retrieval results
In the area of image retrieval, post-retrieval processing is often used to refine the retrieval results to better satisfy users’ requirements. Previous methods mainly focus on p...
Kai Song, YongHong Tian, Wen Gao, Tiejun Huang
CCS
2005
ACM
13 years 11 months ago
Automatic placement of authorization hooks in the linux security modules framework
We present a technique for automatic placement of authorization hooks, and apply it to the Linux security modules (LSM) framework. LSM is a generic framework which allows diverse ...
Vinod Ganapathy, Trent Jaeger, Somesh Jha
TMC
2010
165views more  TMC 2010»
13 years 21 days ago
Energy-Efficient VoIP over Wireless LANs
Emerging dual-mode phones incorporate a Wireless LAN (WLAN) interface along with the traditional cellular interface. The additional benefits of the WLAN interface are, however, lik...
Vinod Namboodiri, Lixin Gao