Sciweavers

102291 search results - page 20049 / 20459
» Computing
Sort
View
130
Voted
ESORICS
2010
Springer
15 years 3 months ago
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated A...
Alexandros Kapravelos, Iasonas Polakis, Elias Atha...
167
Voted
GECCO
2010
Springer
244views Optimization» more  GECCO 2010»
15 years 3 months ago
Implicit fitness and heterogeneous preferences in the genetic algorithm
This paper takes an economic approach to derive an evolutionary learning model based entirely on the endogenous employment of genetic operators in the service of self-interested a...
Justin T. H. Smith
125
Voted
ICMCS
2010
IEEE
149views Multimedia» more  ICMCS 2010»
15 years 3 months ago
Single-view recaptured image detection based on physics-based features
In daily life, we can see images of real-life objects on posters, television, or virtually any type of smooth physical surfaces. We seldom confuse these images with the objects pe...
Xinting Gao, Tian-Tsong Ng, Bo Qiu, Shih-Fu Chang
ICA
2010
Springer
15 years 3 months ago
Probabilistic Latent Tensor Factorization
We develop a probabilistic modeling framework for multiway arrays. Our framework exploits the link between graphical models and tensor factorization models and it can realize any ...
Y. Kenan Yilmaz, A. Taylan Cemgil
130
Voted
MM
2010
ACM
167views Multimedia» more  MM 2010»
15 years 3 months ago
Improving online gaming quality using detour paths
We study the problem of improving the user perceived quality of online games in which multiple players form a game session and exchange game-state updates over an overlay network....
Cong Ly, Cheng-Hsin Hsu, Mohamed Hefeeda
« Prev « First page 20049 / 20459 Last » Next »