Sciweavers

2725 search results - page 505 / 545
» A framework for P2P application development
Sort
View
NDSS
2008
IEEE
15 years 4 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
IBPRIA
2007
Springer
15 years 3 months ago
Optimally Discriminant Moments for Speckle Detection in Real B-Scan Images
Detection of speckle in ultrasound (US) images has been regarded as an important research topic in US imaging, mainly focusing on two specific applications: improving signal to no...
Robert Marti, Joan Martí, Jordi Freixenet, ...
MM
2004
ACM
149views Multimedia» more  MM 2004»
15 years 3 months ago
Designing experiential environments for management of personal multimedia
With the increasing ubiquity of sensors and computational resources, it is becoming easier and increasingly common for people to electronically record, photographs, text, audio, a...
Rahul Singh, Rachel Knickmeyer, Punit Gupta, Rames...
CCGRID
2002
IEEE
15 years 2 months ago
Overcoming the Problems Associated with the Existence of Too Many DSM APIs
Despite the large research efforts in the SW–DSM community, this technology has not yet been adapted widely for significant codes beyond benchmark suites. One of the reasons co...
Martin Schulz
ICDE
2010
IEEE
240views Database» more  ICDE 2010»
15 years 2 months ago
Top-K aggregation queries over large networks
Searching and mining large graphs today is critical to a variety of application domains, ranging from personalized recommendation in social networks, to searches for functional ass...
Xifeng Yan, Bin He, Feida Zhu, Jiawei Han