Sciweavers

439 search results - page 14 / 88
» An Evaluation Framework for Plagiarism Detection
Sort
View
ASUNAM
2009
IEEE
15 years 6 months ago
Detecting Structural Changes and Command Hierarchies in Dynamic Social Networks
Community detection in social networks varying with time is a common yet challenging problem whereby efficient visualization of evolving relationships and implicit hierarchical s...
Romain Bourqui, Frédéric Gilbert, Pa...
ISICA
2009
Springer
15 years 8 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong
ICCV
2009
IEEE
16 years 6 months ago
Evaluating Information Contributions of Bottom-up and Top-down Processes
This paper presents a method to quantitatively evaluate information contributions of individual bottom-up and topdown computing processes in object recognition. Our objective is...
Xiong Yang, Tianfu Wu, Song-Chun Zhu
HIPEAC
2005
Springer
15 years 7 months ago
A Practical Method for Quickly Evaluating Program Optimizations
This article aims at making iterative optimization practical and usable by speeding up the evaluation of a large range of optimizations. Instead of using a full run to evaluate a s...
Grigori Fursin, Albert Cohen, Michael F. P. O'Boyl...
NOSSDAV
2010
Springer
15 years 6 months ago
RTP-miner: a real-time security framework for RTP fuzzing attacks
Real-time Transport Protocol (RTP) is a widely adopted standard for transmission of multimedia traffic in Internet telephony (commonly known as VoIP). Therefore, it is a hot poten...
M. Ali Akbar, Muddassar Farooq