Sciweavers

4208 search results - page 599 / 842
» Challenges in Evaluating Distributed Algorithms
Sort
View
110
Voted
CIDM
2007
IEEE
15 years 2 months ago
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
— Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, aft...
Robert Moskovitch, Ido Gus, Shay Pluderman, Dima S...
CORR
2006
Springer
104views Education» more  CORR 2006»
15 years 2 months ago
Unmanaged Internet Protocol: Taming the Edge Network Management Crisis
Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarc...
Bryan Ford
SIGECOM
2008
ACM
144views ECommerce» more  SIGECOM 2008»
15 years 1 months ago
Incentives for expressing opinions in online polls
Prediction markets efficiently extract and aggregate the private information held by individuals about events and facts that can be publicly verified. However, facts such as the e...
Radu Jurca, Boi Faltings
TIP
2008
124views more  TIP 2008»
15 years 1 months ago
Robust Shape Tracking With Multiple Models in Ultrasound Images
This paper addresses object tracking in ultrasound images using a robust multiple model tracker. The proposed tracker has the following features: 1) it uses multiple dynamic models...
Jacinto C. Nascimento, Jorge S. Marques
PAMI
2007
106views more  PAMI 2007»
15 years 1 months ago
From Template to Image: Reconstructing Fingerprints from Minutiae Points
—Most fingerprint-based biometric systems store the minutiae template of a user in the database. It has been traditionally assumed that the minutiae template of a user does not r...
Arun Ross, Jidnya Shah, Anil K. Jain