Sciweavers

205 search results - page 24 / 41
» Detecting algorithmically generated malicious domain names
Sort
View
AAAI
1996
15 years 1 months ago
Lazy Arc Consistency
Arc consistency filtering is widely used in the framework of binary constraint satisfaction problems: with a low complexity, inconsistency may be detected,and domains are filtered...
Thomas Schiex, Jean-Charles Régin, Christin...
MM
2010
ACM
163views Multimedia» more  MM 2010»
14 years 12 months ago
Sonify your face: facial expressions for sound generation
We present a novel visual creativity tool that automatically recognizes facial expressions and tracks facial muscle movements in real time to produce sounds. The facial expression...
Roberto Valenti, Alejandro Jaimes, Nicu Sebe
SIGMOD
2009
ACM
269views Database» more  SIGMOD 2009»
15 years 12 months ago
Efficient approximate entity extraction with edit distance constraints
Named entity recognition aims at extracting named entities from unstructured text. A recent trend of named entity recognition is finding approximate matches in the text with respe...
Wei Wang 0011, Chuan Xiao, Xuemin Lin, Chengqi Zha...
TMI
1998
175views more  TMI 1998»
14 years 11 months ago
A Harmonic Decomposition Reconstruction Algorithm for Spatially-Varying Focal Length Collimators
—Spatially varying focal length fan-beam collimators can be used in single photon emission computed tomography to improve detection efficiency and to reduce reconstruction artif...
Jiangsheng You, Zhengrong Liang, Shanglian Bao
RECOMB
2007
Springer
16 years 2 days ago
An Efficient and Accurate Graph-Based Approach to Detect Population Substructure
Currently, large-scale projects are underway to perform whole genome disease association studies. Such studies involve the genotyping of hundreds of thousands of SNP markers. One o...
Srinath Sridhar, Satish Rao, Eran Halperin