Sciweavers

750 search results - page 90 / 150
» Analysis of Handwriting Individuality Using Word Features
Sort
View
135
Voted
CN
2006
117views more  CN 2006»
15 years 3 months ago
Using equivalence-checking to verify robustness to denial of service
In this paper, we introduce a new security property which intends to capture the ability of a cryptographic protocol being resistant to denial of service. This property, called im...
Stéphane Lafrance
99
Voted
PRL
2008
78views more  PRL 2008»
15 years 3 months ago
Retrieving scale from quasi-stationary images
(204 words) We have developed a novel method to derive scale information from quasi-stationary images, which relies on a rotation-guided multi-scale analysis of features derived fr...
Piotr W. Mirowski, Daniel M. Tetzlaff
173
Voted
CVPR
2009
IEEE
16 years 10 months ago
Recognising Action as Clouds of Space-Time Interest Points
Much of recent action recognition research is based on space-time interest points extracted from video using a Bag of Words (BOW) representation. It mainly relies on the discrimi...
Matteo Bregonzio (Queen Mary, University of London...
173
Voted
CIA
2008
Springer
15 years 5 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
WAW
2010
Springer
231views Algorithms» more  WAW 2010»
15 years 1 months ago
Modeling Traffic on the Web Graph
Abstract. Analysis of aggregate and individual Web requests shows that PageRank is a poor predictor of traffic. We use empirical data to characterize properties of Web traffic not ...
Mark R. Meiss, Bruno Gonçalves, Jose J. Ram...