Sciweavers

20024 search results - page 3597 / 4005
» Database Management Systems
Sort
View
JMLR
2010
185views more  JMLR 2010»
14 years 11 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
TASLP
2010
106views more  TASLP 2010»
14 years 11 months ago
Efficient and Robust Music Identification With Weighted Finite-State Transducers
We present an approach to music identification based on weighted finite-state transducers and Gaussian mixture models, inspired by techniques used in large-vocabulary speech recogn...
Mehryar Mohri, Pedro Moreno, Eugene Weinstein
TCSV
2010
14 years 11 months ago
Wireless Video Quality Assessment: A Study of Subjective Scores and Objective Algorithms
Evaluating the perceptual quality of video is of tremendous importance in the design and optimization of wireless video processing and transmission systems. In an endeavor to emula...
Anush K. Moorthy, Kalpana Seshadrinathan, Rajiv So...
TDP
2010
189views more  TDP 2010»
14 years 11 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...
148
Voted
TOG
2010
181views more  TOG 2010»
14 years 11 months ago
Context-based search for 3D models
Large corpora of 3D models, such as Google 3D Warehouse, are now becoming available on the web. It is possible to search these databases using a keyword search. This makes it poss...
Matthew Fisher, Pat Hanrahan
« Prev « First page 3597 / 4005 Last » Next »