Sciweavers

1053 search results - page 180 / 211
» The Rules of Virtual Groups
Sort
View
77
Voted
CN
2007
106views more  CN 2007»
14 years 11 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...
139
Voted
IJCV
2006
206views more  IJCV 2006»
14 years 11 months ago
Random Sampling for Subspace Face Recognition
Subspacefacerecognitionoftensuffersfromtwoproblems:(1)thetrainingsamplesetissmallcompared with the high dimensional feature vector; (2) the performance is sensitive to the subspace...
Xiaogang Wang, Xiaoou Tang
84
Voted
CORR
2007
Springer
88views Education» more  CORR 2007»
14 years 11 months ago
Target assignment for robotic networks: asymptotic performance under limited communication
— We are given an equal number of mobile robotic agents, and distinct target locations. Each agent has simple integrator dynamics, a limited communication range, and knowledge of...
Stephen L. Smith, Francesco Bullo
77
Voted
IM
2006
14 years 11 months ago
Estimating Entropy and Entropy Norm on Data Streams
We consider the problem of computing information theoretic functions such as entropy on a data stream, using sublinear space. Our first result deals with a measure we call the &quo...
Amit Chakrabarti, Khanh Do Ba, S. Muthukrishnan
DSS
2007
124views more  DSS 2007»
14 years 11 months ago
Access control in collaborative commerce
Corporate collaboration allows organizations to improve the efficiency and quality of their business activities. It may occur as a workflow collaboration, a supply chain collabora...
Eldon Y. Li, Timon C. Du, Jacqueline W. Wong