Sciweavers

4155 search results - page 735 / 831
» Topic-Specific Optimization and Structuring
Sort
View
VLDB
2010
ACM
190views Database» more  VLDB 2010»
14 years 12 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
DAGM
2010
Springer
14 years 11 months ago
3D Reconstruction Using an n-Layer Heightmap
We present a novel method for 3D reconstruction of urban scenes extending a recently introduced heightmap model. Our model has several advantages for 3D modeling of urban scenes: i...
David Gallup, Marc Pollefeys, Jan-Michael Frahm
ICEIS
2010
IEEE
14 years 11 months ago
Pattern Recognition as a Human Centered non-Euclidean Problem
Regularities in the world are human defined. Patterns in the observed phenomena are there because we define and recognize them as such. Automatic pattern recognition tries to bridg...
Robert P. W. Duin
119
Voted
IPPS
2010
IEEE
14 years 11 months ago
Head-body partitioned string matching for Deep Packet Inspection with scalable and attack-resilient performance
Abstract--Dictionary-based string matching (DBSM) is a critical component of Deep Packet Inspection (DPI), where thousands of malicious patterns are matched against high-bandwidth ...
Yi-Hua E. Yang, Viktor K. Prasanna, Chenqian Jiang
134
Voted
KDD
2009
ACM
210views Data Mining» more  KDD 2009»
16 years 2 months ago
Large-scale behavioral targeting
Behavioral targeting (BT) leverages historical user behavior to select the ads most relevant to users to display. The state-of-the-art of BT derives a linear Poisson regression mo...
Ye Chen, Dmitry Pavlov, John F. Canny