Sciweavers

4099 search results - page 667 / 820
» First Class Patterns
Sort
View
115
Voted
TMA
2010
Springer
183views Management» more  TMA 2010»
15 years 7 days ago
Kiss to Abacus: A Comparison of P2P-TV Traffic Classifiers
In the last few years the research community has proposed several techniques for network traffic classification. While the performance of these methods is promising especially for ...
Alessandro Finamore, Michela Meo, Dario Rossi, Sil...
133
Voted
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
15 years 6 days ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
DRR
2009
15 years 5 days ago
Using synthetic data safely in classification
When is it safe to use synthetic data in supervised classification? Trainable classifier technologies require large representative training sets consisting of samples labeled with...
Jean Nonnemaker, Henry Baird
EKNOW
2009
15 years 5 days ago
Visual Middle-Out Modeling of Problem Spaces
Modeling is a complex and central activity in many domains. Domain experts and designers usually work by drawing and create models from the middle-out; however, visual and middle-...
Andrea Valente
HCI
2009
15 years 5 days ago
Modeling Human Actors in an Intelligent Automated Warehouse
Warehouse automation has progressed at a rapid pace over the last decade. While the tendency has been to implement fully automated solutions, most warehouses today exist as a mixtu...
Davy Preuveneers, Yolande Berbers