Sciweavers

8177 search results - page 1508 / 1636
» Detecting System Emulators
Sort
View
137
Voted
CORR
2010
Springer
286views Education» more  CORR 2010»
15 years 6 days ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos
163
Voted
CVPR
2011
IEEE
14 years 11 months ago
Monocular 3D Scene Understanding with Explicit Occlusion Reasoning
Scene understanding from a monocular, moving camera is a challenging problem with a number of applications including robotics and automotive safety. While recent systems have show...
Christian Wojek, Stefan Walk, Stefan Roth, Bernt S...
155
Voted
CCR
2011
14 years 10 months ago
Misbehaviors in TCP SACK generation
While analyzing CAIDA Internet traces of TCP traffic to detect instances of data reneging, we frequently observed seven misbehaviors in the generation of SACKs. These misbehaviors...
Nasif Ekiz, Abuthahir Habeeb Rahman, Paul D. Amer
243
Voted
COLING
2010
14 years 10 months ago
Robust Measurement and Comparison of Context Similarity for Finding Translation Pairs
In cross-language information retrieval it is often important to align words that are similar in meaning in two corpora written in different languages. Previous research shows tha...
Daniel Andrade, Tetsuya Nasukawa, Jun-ichi Tsujii
CSI
2011
219views Social Sciences» more  CSI 2011»
14 years 10 months ago
Estimation method for the consciousness level while driving vehicles
Automobile industry is required extremely energy saving, and active safety technology. The study has been estimation consciousness and concentration using shoulder line, quantity o...
T. Sugimoto, A. Tohshima
« Prev « First page 1508 / 1636 Last » Next »