Sciweavers

205 search results - page 37 / 41
» Detecting algorithmically generated malicious domain names
Sort
View
MIR
2005
ACM
181views Multimedia» more  MIR 2005»
15 years 3 months ago
Video booklet: a natural video searching and browsing interface
In this paper, we propose a novel system, named Video Booklet, which enables efficient and natural personal video browsing and searching. In the system, firstly representative th...
Cai-Zhi Zhu, Xian-Sheng Hua, Tao Mei, Xiuqing Wu
FPL
2008
Springer
254views Hardware» more  FPL 2008»
14 years 11 months ago
Digital hilbert transformers for FPGA-based phase-locked loops
The phase detector is a main building block in phaselocked loop (PLL) applications. FPGAs permit the realtime implementation of the CORDIC algorithm which offers an efficient solu...
Martin Kumm, M. Shahab Sanjari
IJCAI
2007
14 years 11 months ago
Learning to Identify Unexpected Instances in the Test Set
Traditional classification involves building a classifier using labeled training examples from a set of predefined classes and then applying the classifier to classify test instan...
Xiaoli Li, Bing Liu, See-Kiong Ng
UAI
2008
14 years 11 months ago
CT-NOR: Representing and Reasoning About Events in Continuous Time
We present a generative model for representing and reasoning about the relationships among events in continuous time. We apply the model to the domain of networked and distributed...
Aleksandr Simma, Moisés Goldszmidt, John Ma...
TWC
2008
109views more  TWC 2008»
14 years 9 months ago
Using the physical layer for wireless authentication in time-variant channels
Abstract--The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to expl...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...