Sciweavers

205 search results - page 30 / 41
» Detecting algorithmically generated malicious domain names
Sort
View
VTC
2007
IEEE
149views Communications» more  VTC 2007»
15 years 6 months ago
An Iterative Detection Aided Irregular Convolutional Coded Wavelet Videophone Scheme Using Reversible Variable-Length Codes and
— In this paper, we characterize the achievable performance of a wavelet encoding-based videophone system, which further compresses and protects the wavelet-based video codec’s...
Anh Quang Pham, Jin Wang, Lie-Liang Yang, Lajos Ha...
TOG
2008
143views more  TOG 2008»
14 years 11 months ago
Discovering structural regularity in 3D geometry
We introduce a computational framework for discovering regular or repeated geometric structures in 3D shapes. We describe and classify possible regular structures and present an e...
Mark Pauly, Niloy J. Mitra, Johannes Wallner, Helm...
RAS
2008
135views more  RAS 2008»
14 years 11 months ago
Constructing dependable certainty grids from unreliable sensor data
-- Measurements from sensors as they are used for robotic grid map applications typically show behavior like degradation or discalibration over time, which affects the quality of t...
Wilfried Elmenreich
ACL
2007
15 years 1 months ago
An Ensemble Method for Selection of High Quality Parses
While the average performance of statistical parsers gradually improves, they still attach to many sentences annotations of rather low quality. The number of such sentences grows ...
Roi Reichart, Ari Rappoport
DPD
2002
126views more  DPD 2002»
14 years 11 months ago
HiCoMo: High Commit Mobile Transactions
Abstract. We introduce a new mobile transaction model applicable to decisionmaking applications over aggregate data warehoused on mobile hosts. The model allows the aggregate data ...
Minsoo Lee, Abdelsalam Helal