Sciweavers

588 search results - page 95 / 118
» Positive higher-order queries
Sort
View
NDSS
2005
IEEE
15 years 5 months ago
DNS-based Detection of Scanning Worms in an Enterprise Network
Worms are arguably the most serious security threat facing the Internet. Seeking a detection technique that is both sufficiently efficient and accurate to enable automatic conta...
David Whyte, Evangelos Kranakis, Paul C. van Oorsc...
WACV
2005
IEEE
15 years 5 months ago
Dental Biometrics: Alignment and Matching of Dental Radiographs
—Dental biometrics utilizes dental radiographs for human identification. The dental radiographs provide information about teeth, including tooth contours, relative positions of n...
Hong Chen, Anil K. Jain
SIGCOMM
2005
ACM
15 years 5 months ago
A case study in building layered DHT applications
Recent research has shown that one can use Distributed Hash Tables (DHTs) to build scalable, robust and efficient applications. One question that is often left unanswered is that ...
Yatin Chawathe, Sriram Ramabhadran, Sylvia Ratnasa...
ISMIR
2005
Springer
179views Music» more  ISMIR 2005»
15 years 5 months ago
Discovering and Visualizing Prototypical Artists by Web-Based Co-Occurrence Analysis
Detecting artists that can be considered as prototypes for particular genres or styles of music is an interesting task. In this paper, we present an approach that ranks artists ac...
Markus Schedl, Peter Knees, Gerhard Widmer
COMPGEOM
2004
ACM
15 years 5 months ago
A computational framework for incremental motion
We propose a generic computational framework for maintaining a discrete geometric structure defined by a collection of static and mobile objects. We assume that the mobile object...
David M. Mount, Nathan S. Netanyahu, Christine D. ...