Sciweavers

518 search results - page 88 / 104
» A Framework for Experimental Evaluation of Clustering Techni...
Sort
View
DSN
2009
IEEE
15 years 6 months ago
On the effectiveness of structural detection and defense against P2P-based botnets
Recently, peer-to-peer (P2P) networks have emerged as a covert communication platform for malicious programs known as bots. As popular distributed systems, they allow bots to comm...
Duc T. Ha, Guanhua Yan, Stephan Eidenbenz, Hung Q....
DAC
2008
ACM
16 years 22 days ago
Cache modeling in probabilistic execution time analysis
Multimedia-dominated consumer electronics devices (such as cellular phone, digital camera, etc.) operate under soft real-time constraints. Overly pessimistic worst-case execution ...
Yun Liang, Tulika Mitra
WWW
2008
ACM
16 years 12 days ago
User behavior oriented web spam detection
Combating Web spam has become one of the top challenges for Web search engines. State-of-the-art spam detection techniques are usually designed for specific known types of Web spa...
Yiqun Liu, Min Zhang, Shaoping Ma, Liyun Ru
ACIVS
2009
Springer
15 years 6 months ago
Multiple Human Tracking in High-Density Crowds
Abstract. In this paper, we present a fully automatic approach to multiple human detection and tracking in high density crowds in the presence of extreme occlusion. Human detection...
Irshad Ali, Matthew N. Dailey
ICASSP
2008
IEEE
15 years 6 months ago
Hybrid feature selection for gesture recognition using support vector machines
This paper presents an approach for a multi-cue based two-dimensional gesture recognition that combines two different forms of cues, namely shape cues and motion cues, in a suppor...
Yu Yuan, Kenneth Barner