Sciweavers

876 search results - page 153 / 176
» Propagating Class and Method Combination
Sort
View
ICNP
2006
IEEE
15 years 3 months ago
Internet Cache Pollution Attacks and Countermeasures
Abstract— Proxy caching servers are widely deployed in today’s Internet. While cooperation among proxy caches can significantly improve a network’s resilience to denial-of-s...
Yan Gao, Leiwen Deng, Aleksandar Kuzmanovic, Yan C...
CVPR
2005
IEEE
15 years 3 months ago
Jensen-Shannon Boosting Learning for Object Recognition
In this paper, we propose a novel learning method, called Jensen-Shannon Boosting (JSBoost) and demonstrate its application to object recognition. JSBoost incorporates Jensen-Shan...
Xiangsheng Huang, Stan Z. Li, Yangsheng Wang
PPDP
2005
Springer
15 years 3 months ago
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures
Formal methods have proved to be very useful for analyzing cryptographic protocols. However, most existing techniques apply to the case of abstract encryption schemes and pairing....
Véronique Cortier, Michaël Rusinowitch...
73
Voted
MM
2004
ACM
117views Multimedia» more  MM 2004»
15 years 3 months ago
Singing voice detection in popular music
We propose a novel technique for the automatic classification of vocal and non-vocal regions in an acoustic musical signal. Our technique uses a combination of harmonic content a...
Tin Lay Nwe, Arun Shenoy, Ye Wang
IFM
2004
Springer
125views Formal Methods» more  IFM 2004»
15 years 3 months ago
Formally Justifying User-Centred Design Rules: A Case Study on Post-completion Errors
Abstract. Interactive systems combine a human operator with a computer. Either may be a source of error. The veri cation processes used must ensure both the correctness of the comp...
Paul Curzon, Ann Blandford