Sciweavers

2016 search results - page 122 / 404
» Some observations on HC-128
Sort
View
61
Voted
ICDM
2009
IEEE
127views Data Mining» more  ICDM 2009»
15 years 7 months ago
Aspect Guided Text Categorization with Unobserved Labels
This paper proposes a novel multiclass classification method and exhibits its advantage in the domain of text categorization with a large label space and, most importantly, when ...
Dan Roth, Yuancheng Tu
64
Voted
MMSEC
2004
ACM
95views Multimedia» more  MMSEC 2004»
15 years 6 months ago
An improved attack analysis on a public-key spread spectrum watermarking
We analyze the fingerprinting method in [1] and suggest attacks that are better than the ones presented therein. To do this, we observe and use some extra information available i...
Mustafa Kesal, Mehmet Kivanç Mihçak,...
102
Voted
KDD
2003
ACM
99views Data Mining» more  KDD 2003»
16 years 1 months ago
Fragments of order
High-dimensional collections of 0-1 data occur in many applications. The attributes in such data sets are typically considered to be unordered. However, in many cases there is a n...
Aristides Gionis, Teija Kujala, Heikki Mannila
91
Voted
CCS
2009
ACM
15 years 7 months ago
As-awareness in Tor path selection
Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an a...
Matthew Edman, Paul F. Syverson
154
Voted
ACMSE
2008
ACM
15 years 2 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins