Sciweavers

776 search results - page 151 / 156
» Conceptual Patterns for Reuse in Information Systems Analysi...
Sort
View
WWW
2005
ACM
16 years 1 months ago
Opinion observer: analyzing and comparing opinions on the Web
The Web has become an excellent source for gathering consumer opinions. There are now numerous Web sites containing such opinions, e.g., customer reviews of products, forums, disc...
Bing Liu, Minqing Hu, Junsheng Cheng
ACMSE
2008
ACM
15 years 2 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins
ESORICS
2004
Springer
15 years 5 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
PAMI
2011
14 years 7 months ago
Matching Forensic Sketches to Mug Shot Photos
—The problem of matching a forensic sketch to a gallery of mug shot images is addressed in this paper. Previous research in sketch matching only offered solutions to matching hig...
Brendan Klare, Zhifeng Li, Anil K. Jain
MVA
1990
162views Computer Vision» more  MVA 1990»
15 years 1 months ago
Map-Driven Image Interpretation by Associative Model Indexing
d at a high abstraction level, and consists in an expectation-driven search starting from symbolic object descriptions and using a version of a distributed blackboard system for re...
Gian Luca Foresti, Vittorio Murino, Carlo S. Regaz...