Sciweavers

704 search results - page 132 / 141
» Exploiting Data Missingness in Bayesian Network Modeling
Sort
View
ASIAN
2004
Springer
180views Algorithms» more  ASIAN 2004»
15 years 4 months ago
Counting by Coin Tossings
Abstract. This text is an informal review of several randomized algorithms that have appeared over the past two decades and have proved instrumental in extracting efficiently quant...
Philippe Flajolet
GRC
2010
IEEE
14 years 12 months ago
Learning Multiple Latent Variables with Self-Organizing Maps
Inference of latent variables from complicated data is one important problem in data mining. The high dimensionality and high complexity of real world data often make accurate infe...
Lili Zhang, Erzsébet Merényi
76
Voted
DIMVA
2007
15 years 9 days ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...
MM
2006
ACM
89views Multimedia» more  MM 2006»
15 years 4 months ago
Towards scalable delivery of video streams to heterogeneous receivers
The required real-time and high-rate transfers for multimedia data severely limit the number of requests that can be serviced concurrently by Video-on-Demand (VOD) servers. Resour...
Bashar Qudah, Nabil J. Sarhan
LCN
2007
IEEE
15 years 5 months ago
Sender Access Control in IP Multicast
—Multicasting has not been widely adopted until now, due to lack of access control over the group members. The Authentication, Authorization and Accounting (AAA) protocols are be...
Salekul Islam, J. William Atwood