Sciweavers

7891 search results - page 1489 / 1579
» Local Area Networking
Sort
View
LISA
2001
15 years 16 days ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
UAI
2004
15 years 16 days ago
Dependent Dirichlet Priors and Optimal Linear Estimators for Belief Net Parameters
A Bayesian belief network is a model of a joint distribution over a finite set of variables, with a DAG structure representing immediate dependencies among the variables. For each...
Peter Hooper
ICMAS
2000
15 years 16 days ago
Assessing Usage Patterns to Improve Data Allocation via Auctions
The data allocation problem in incomplete information environments consisting of self-motivated servers responding to users' queries is considered. Periodically, the servers ...
Rina Azoulay-Schwartz, Sarit Kraus
BMVC
1997
15 years 15 days ago
Employing Region Features for Searching an Image Database
This paper describes recent work on the use of regional data extracted from segmented images for use as search keys in an image database query system. The motivation for this work...
Matthew E. J. Wood, Neill W. Campbell, Barry T. Th...
WEBNET
1998
15 years 15 days ago
Using Metadata to Improve Organization and Information Retrieval on the WWW
: Until now the growing volume of heterogeneous and distributed information on the WWW makes increasingly difficult for the existing tools to retrieve relevant information. To impr...
Bich-Liên Doan, Michel Beigbeder, Jean-Jacqu...
« Prev « First page 1489 / 1579 Last » Next »