Sciweavers

21490 search results - page 3910 / 4298
» Business Process Modeling
Sort
View
MMM
2010
Springer
154views Multimedia» more  MMM 2010»
15 years 8 months ago
Learning Cooking Techniques from YouTube
Abstract. Cooking is a human activity with sophisticated process. Underlying the multitude of culinary recipes, there exist a set of fundamental and general cooking techniques, suc...
Guangda Li, Richang Hong, Yantao Zheng, Shuicheng ...
ACSAC
2004
IEEE
15 years 8 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
AIRS
2004
Springer
15 years 8 months ago
Combining Sentence Length with Location Information to Align Monolingual Parallel Texts
Abundant Chinese paraphrasing resource on Internet can be attained from different Chinese translations of one foreign masterpiece. Paraphrases corpus is the corpus that includes s...
Weigang Li, Ting Liu, Sheng Li
AMR
2006
Springer
137views Multimedia» more  AMR 2006»
15 years 8 months ago
A General Principled Method for Image Similarity Validation
A novel and general criterion for image similarity validation is introduced using the so-called a contrario decision framework. It is mathematically proved that it is possible to c...
Frédéric Cao, Patrick Bouthemy
CCGRID
2004
IEEE
15 years 8 months ago
Data durability in peer to peer storage systems
In this paper we present a quantitative study of data survival in peer to peer storage systems. We first recall two main redundancy mechanisms: replication and erasure codes, whic...
G. Utard, Antoine Vernois
« Prev « First page 3910 / 4298 Last » Next »