Sciweavers

910 search results - page 52 / 182
» Detecting False Matches in String Matching Algorithms
Sort
View
SEC
2008
15 years 4 months ago
Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models
The Session Initiation Protocol (SIP) has been used widely for Voice over IP (VoIP) service because of its potential advantages, economical efficiency and call setup simplicity. Ho...
Dongwon Seo, Heejo Lee, Ejovi Nuwere
ICDM
2006
IEEE
176views Data Mining» more  ICDM 2006»
15 years 9 months ago
Razor: mining distance-constrained embedded subtrees
Due to their capability for expressing semantics and relationships among data objects, semi-structured documents have become a common way of representing domain knowledge. Compari...
Henry Tan, Tharam S. Dillon, Fedja Hadzic, Elizabe...
CVPR
2007
IEEE
16 years 5 months ago
Keypoint Descriptors for Matching Across Multiple Image Modalities and Non-linear Intensity Variations
In this paper, we investigate the effect of substantial inter-image intensity changes and changes in modality on the performance of keypoint detection, description, and matching a...
Avi Kelman, Michal Sofka, Charles V. Stewart
ICPR
2006
IEEE
16 years 4 months ago
A Non-Iterative Approach to Reconstruct Face Templates from Match Scores
Regeneration of biometric templates from match scores has security and privacy implications related to any biometric based authentication system. In this paper, we propose a novel...
Pranab Mohanty, Rangachar Kasturi, Sudeep Sarkar
KDD
2012
ACM
263views Data Mining» more  KDD 2012»
13 years 5 months ago
Integrating community matching and outlier detection for mining evolutionary community outliers
Temporal datasets, in which data evolves continuously, exist in a wide variety of applications, and identifying anomalous or outlying objects from temporal datasets is an importan...
Manish Gupta, Jing Gao, Yizhou Sun, Jiawei Han