Sciweavers

42388 search results - page 8124 / 8478
» Classification Using Information
Sort
View
USS
2008
15 years 6 months ago
Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks
Large-scale bandwidth-based distributed denial-of-service (DDoS) attacks can quickly knock out substantial parts of a network before reactive defenses can respond. Even traffic flo...
Jerry Chi-Yuan Chou, Bill Lin, Subhabrata Sen, Oli...
COCO
2010
Springer
149views Algorithms» more  COCO 2010»
15 years 6 months ago
Trade-Off Lower Bounds for Stack Machines
—A space bounded Stack Machine is a regular Turing Machine with a read-only input tape, several space bounded read-write work tapes, and an unbounded stack. Stack Machines with a...
Matei David, Periklis A. Papakonstantinou
AIRWEB
2008
Springer
15 years 6 months ago
Robust PageRank and locally computable spam detection features
Since the link structure of the web is an important element in ranking systems on search engines, web spammers widely use the link structure of the web to increase the rank of the...
Reid Andersen, Christian Borgs, Jennifer T. Chayes...
APGV
2008
ACM
141views Visualization» more  APGV 2008»
15 years 6 months ago
The assumed light direction for perceiving shape from shading
Recovering 3D shape from shading is an ill-posed problem that the visual system can solve only by making use of additional information such as the position of the light source. Pr...
James P. O'Shea, Martin S. Banks, Maneesh Agrawala
EDBT
2010
ACM
210views Database» more  EDBT 2010»
15 years 6 months ago
Keyword search for data-centric XML collections with long text fields
Users who are unfamiliar with database query languages can search XML data sets using keyword queries. Current approaches for supporting such queries are either for textcentric XM...
Arash Termehchy, Marianne Winslett
« Prev « First page 8124 / 8478 Last » Next »