Sciweavers

1045 search results - page 207 / 209
» Learning from Aggregate Views
Sort
View
ICMCS
1999
IEEE
126views Multimedia» more  ICMCS 1999»
13 years 10 months ago
Error Spreading: Reducing Bursty Errors in Continuous Media Streaming
With the growing popularity of the Internet, there is increasing interest in using it for audio and video transmission. Periodic network overloads, leading to bursty packet losses...
Hung Q. Ngo, Srivatsan Varadarajan, Jaideep Srivas...
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
13 years 10 months ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...
FC
2010
Springer
171views Cryptology» more  FC 2010»
13 years 10 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
SP
2010
IEEE
165views Security Privacy» more  SP 2010»
13 years 10 months ago
A Practical Attack to De-anonymize Social Network Users
—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates. These sites have millions of registered users, and they are interestin...
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Chr...
RSS
2007
145views Robotics» more  RSS 2007»
13 years 7 months ago
Semantic Modeling of Places using Objects
— While robot mapping has seen massive strides , higher level abstractions in map representation are still not widespread. Maps containing semantic concepts such as objects and l...
Ananth Ranganathan, Frank Dellaert