Sciweavers

1967 search results - page 352 / 394
» The Case for Determinism in Database Systems
Sort
View
103
Voted
JMLR
2010
185views more  JMLR 2010»
14 years 5 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
ICCV
2011
IEEE
13 years 11 months ago
Predicting Occupation via Human Clothing and Contexts
Predicting human occupations in photos has great application potentials in intelligent services and systems. However, using traditional classification methods cannot reliably dis...
Zheng Song, Meng Wang, Xian-Sheng Hua, Shuicheng Y...
IACR
2011
113views more  IACR 2011»
13 years 10 months ago
Fully Homomorphic SIMD Operations
At PKC 2010 Smart and Vercauteren presented a variant of Gentry’s fully homomorphic public key encryption scheme and mentioned that the scheme could support SIMD style operations...
Nigel P. Smart, Frederik Vercauteren
IROS
2009
IEEE
203views Robotics» more  IROS 2009»
15 years 5 months ago
CoMutaR: A framework for multi-robot coordination and task allocation
— In multi-robot systems, task allocation and coordination are two fundamental problems that share high synergy. Although multi-robot architectures typically separate them into d...
Pedro M. Shiroma, Maria Fernando Montenegro Campos
ECAL
2007
Springer
15 years 5 months ago
Multi-level Selection in the Emergence of Language Systematicity
Language can be viewed as a complex adaptive system which is continuously shaped and reshaped by the actions of its users as they try to solve communicative problems. To maintain c...
Luc Steels, Remi van Trijp, Pieter Wellens