Sciweavers

1816 search results - page 348 / 364
» Formal Concepts of Learning Systems Validation in Use
Sort
View
ACSAC
2007
IEEE
15 years 3 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Mengjun Xie, Zhenyu Wu, Haining Wang
CIKM
2008
Springer
14 years 11 months ago
SQL extension for exploring multiple tables
The standard SQL assumes that the users are aware of all tables and their schemas to write queries. This assumption may be valid when the users deal with a relatively small number...
Sung Jin Kim, Junghoo John Cho
BMCBI
2008
106views more  BMCBI 2008»
14 years 9 months ago
Ontology Design Patterns for bio-ontologies: a case study on the Cell Cycle Ontology
Background: Bio-ontologies are key elements of knowledge management in bioinformatics. Rich and rigorous bio-ontologies should represent biological knowledge with high fidelity an...
Mikel Egaña Aranguren, Erick Antezana, Mart...
FGR
2011
IEEE
205views Biometrics» more  FGR 2011»
14 years 28 days ago
High resolution face sequences from a PTZ network camera
Abstract— We propose here to acquire high resolution sequences of a person’s face using a pan-tilt-zoom (PTZ) network camera. This capability should prove helpful in forensic a...
Thang Ba Dinh, Nam Vo, Gérard G. Medioni
91
Voted
SASO
2007
IEEE
15 years 3 months ago
An Amortized Tit-For-Tat Protocol for Exchanging Bandwidth instead of Content in P2P Networks
Incentives for resource sharing are crucial for the proper operation of P2P networks. The principle of the incentive mechanisms in current content sharing P2P networks such as Bit...
Pawel Garbacki, Dick H. J. Epema, Maarten van Stee...