Sciweavers

219 search results - page 31 / 44
» A Half-Space Approach to Order Dimension
Sort
View
ICIP
2007
IEEE
15 years 8 months ago
A Novel Kernel Discriminant Analysis for Face Verification
In this paper a novel non-linear subspace method for face verification is proposed. The problem of face verification is considered as a two-class problem (genuine versus imposto...
Georgios Goudelis, Stefanos Zafeiriou, Anastasios ...
105
Voted
AUSDM
2007
Springer
112views Data Mining» more  AUSDM 2007»
15 years 8 months ago
Measuring Data-Driven Ontology Changes using Text Mining
Most current ontology management systems concentrate on detecting usage-driven changes and representing changes formally in order to maintain the consistency. In this paper, we pr...
Majigsuren Enkhsaikhan, Wilson Wong, Wei Liu, Mark...
113
Voted
FOCS
2006
IEEE
15 years 7 months ago
Algorithms on negatively curved spaces
d abstract] Robert Krauthgamer ∗ IBM Almaden James R. Lee † Institute for Advanced Study We initiate the study of approximate algorithms on negatively curved spaces. These spa...
Robert Krauthgamer, James R. Lee
89
Voted
GLOBECOM
2006
IEEE
15 years 7 months ago
Scalable Hierarchical Traceback
—Distributed Denial of Service attacks have recently emerged as one of the most potent, if not the greatest, weaknesses of the Internet. Previous solutions for this problem try t...
Arjan Durresi, Vamsi Paruchuri
109
Voted
INFOCOM
2005
IEEE
15 years 7 months ago
FIT: fast Internet traceback
— Traceback mechanisms are a critical part of the defense against IP spoofing and DoS attacks, as well as being of forensic value to law enforcement. Currently proposed IP trace...
Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song