Sciweavers

4052 search results - page 727 / 811
» Comparing Networks from a Data Analysis Perspective
Sort
View
PET
2005
Springer
15 years 5 months ago
Privacy Vulnerabilities in Encrypted HTTP Streams
Abstract. Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward traffic analysis attack against encrypted HT...
George Dean Bissias, Marc Liberatore, David Jensen...
AAAI
2006
15 years 1 months ago
Salience in Orientation-Filter Response Measured as Suspicious Coincidence in Natural Images
Visual cortex neurons have receptive fields resembling oriented bandpass filters, and their response distributions on natural images are non-Gaussian. Inspired by this, we previou...
Subramonia Sarma, Yoonsuck Choe
ISSRE
2000
IEEE
15 years 4 months ago
Evaluation of Regressive Methods for Automated Generation of Test Trajectories
Automated generation of test cases is a prerequisite for fast testing. Whereas the research has addressed the creation of individual test points, test trajectoiy generation has at...
Brian J. Taylor, Bojan Cukic
BMCBI
2006
119views more  BMCBI 2006»
14 years 12 months ago
Hidden Markov Model Variants and their Application
Markov statistical methods may make it possible to develop an unsupervised learning process that can automatically identify genomic structure in prokaryotes in a comprehensive way...
Stephen Winters-Hilt
CVPR
2011
IEEE
14 years 7 months ago
Accelerated Low-Rank Visual Recovery by Random Projection
Exact recovery from contaminated visual data plays an important role in various tasks. By assuming the observed data matrix as the addition of a low-rank matrix and a sparse matri...
Yadong Mu, Jian Dong, Xiaotong Yuan, Shuicheng Yan