Sciweavers

14078 search results - page 2688 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
131
Voted
GRC
2008
IEEE
15 years 4 months ago
Effects of Varying the Delay Distribution in Random, Scale-free, and Small-world Networks
Graph-theory-based approaches have been used with great success when analyzing abstract properties of natural and artificial networks. However, these approaches have not factored...
Bum Soon Jang, Timothy Mann, Yoonsuck Choe
CCS
2010
ACM
15 years 3 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
ICDE
2010
IEEE
562views Database» more  ICDE 2010»
16 years 3 months ago
Multi-Guarded Safe Zone: An Effective Technique to Monitor Moving Circular Range Queries
Given a positive value r, a circular range query returns the objects that lie within the distance r of the query location. In this paper, we study the circular range queries that c...
Muhammad Aamir Cheema, Ljiljana Brankovic, Xuemin ...
PR
2000
102views more  PR 2000»
15 years 3 months ago
Bayesian face recognition
We propose a new technique for direct visual matching of images for the purposes of face recognition and image retrieval, using a probabilistic measure of similarity, based primar...
Baback Moghaddam, Tony Jebara, Alex Pentland
CIKM
2010
Springer
15 years 1 months ago
Document allocation policies for selective searching of distributed indexes
Indexes for large collections are often divided into shards that are distributed across multiple computers and searched in parallel to provide rapid interactive search. Typically,...
Anagha Kulkarni, Jamie Callan
« Prev « First page 2688 / 2816 Last » Next »