Sciweavers

3383 search results - page 592 / 677
» Searching ... in a Web
Sort
View
USS
2008
15 years 5 months ago
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads
We present an automated, scalable, method for crafting dynamic responses to real-time network requests. Specifically, we provide a flexible technique based on natural language pro...
Sam Small, Joshua Mason, Fabian Monrose, Niels Pro...
ALENEX
2009
191views Algorithms» more  ALENEX 2009»
15 years 4 months ago
Theory and Practise of Monotone Minimal Perfect Hashing
Minimal perfect hash functions have been shown to be useful to compress data in several data management tasks. In particular, order-preserving minimal perfect hash functions [10] ...
Djamal Belazzougui, Paolo Boldi, Rasmus Pagh, Seba...
ICCV
2007
IEEE
16 years 5 months ago
Webcam Synopsis: Peeking Around the World
The world is covered with millions of webcams. Some are private, but many transmit everything in their field of view over the internet 24 hours a day. A web search finds public we...
Yael Pritch, Alex Rav-Acha, Avital Gutman, Shmuel ...
ICDE
2009
IEEE
214views Database» more  ICDE 2009»
16 years 5 months ago
Ranking with Uncertain Scores
Large databases with uncertain information are becoming more common in many applications including data integration, location tracking, and Web search. In these applications, ranki...
Mohamed A. Soliman, Ihab F. Ilyas
ICIP
2006
IEEE
16 years 5 months ago
Image Compression using Object-Based Regions of Interest
A new architecture for region of interest (ROI) image coding is proposed. ROIs are defined as image regions containing objects of interest, and an efficient algorithm proposed for...
Sunhyoung Han, Nuno Vasconcelos