Sciweavers

5463 search results - page 1083 / 1093
» Evaluating algorithms that learn from data streams
Sort
View
ICNP
2006
IEEE
15 years 4 months ago
Differentiated BGP Update Processing for Improved Routing Convergence
— Internet routers today can be overwhelmed by a large number of BGP updates triggered by events such as session resets, link failures, and policy changes. Such excessive updates...
Wei Sun, Zhuoqing Morley Mao, Kang G. Shin
SAC
2005
ACM
15 years 3 months ago
Adaptive and fault tolerant medical vest for life-critical medical monitoring
In recent years, exciting technological advances have been made in development of flexible electronics. These technologies offer the opportunity to weave computation, communicat...
Roozbeh Jafari, Foad Dabiri, Philip Brisk, Majid S...
CCS
2005
ACM
15 years 3 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
ICMI
2005
Springer
215views Biometrics» more  ICMI 2005»
15 years 3 months ago
Multimodal multispeaker probabilistic tracking in meetings
Tracking speakers in multiparty conversations constitutes a fundamental task for automatic meeting analysis. In this paper, we present a probabilistic approach to jointly track th...
Daniel Gatica-Perez, Guillaume Lathoud, Jean-Marc ...
EDBT
2009
ACM
116views Database» more  EDBT 2009»
15 years 2 months ago
Ranking objects based on relationships and fixed associations
Text corpora are often enhanced by additional metadata which relate real-world entities, with each document in which such entities are discussed. Such relationships are typically ...
Albert Angel, Surajit Chaudhuri, Gautam Das, Nick ...
« Prev « First page 1083 / 1093 Last » Next »