Sciweavers

1763 search results - page 261 / 353
» Scientific Data Collections and Distributed Collective Pract...
Sort
View
ISW
2010
Springer
14 years 10 months ago
An Analysis of DepenDNS
Recently, a new scheme to protect clients against DNS cache poisoning attacks was introduced. The scheme is referred to as DepenDNS and is intended to protect clients against such ...
Nadhem J. AlFardan, Kenneth G. Paterson
112
Voted
IEAAIE
2009
Springer
14 years 10 months ago
Constructing Decisional DNA on Renewable Energy: A Case Study
Knowledge engineering techniques are becoming useful and popular components of hybrid integrated systems used to solve complicated practical problems in different fields. Knowledge...
Cesar Sanín, Edward Szczerbicki
107
Voted
AAAI
2011
14 years 18 days ago
A Scalable Tree-Based Approach for Joint Object and Pose Recognition
Recognizing possibly thousands of objects is a crucial capability for an autonomous agent to understand and interact with everyday environments. Practical object recognition comes...
Kevin Lai, Liefeng Bo, Xiaofeng Ren, Dieter Fox
121
Voted
WPES
2003
ACM
15 years 5 months ago
Analysis of privacy preserving random perturbation techniques: further explorations
Privacy is becoming an increasingly important issue in many data mining applications, particularly in the security and defense area. This has triggered the development of many pri...
Haimonti Dutta, Hillol Kargupta, Souptik Datta, Kr...
90
Voted
KDD
2006
ACM
143views Data Mining» more  KDD 2006»
16 years 1 months ago
Mining for misconfigured machines in grid systems
Grid systems are proving increasingly useful for managing the batch computing jobs of organizations. One well known example for that is Intel which uses an internally developed sy...
Noam Palatin, Arie Leizarowitz, Assaf Schuster, Ra...