Sciweavers

303 search results - page 58 / 61
» Update Algorithms for the Sketch Data Model
Sort
View
JAIR
2010
181views more  JAIR 2010»
14 years 4 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
ICDE
2005
IEEE
120views Database» more  ICDE 2005»
15 years 11 months ago
Progressive Distributed Top k Retrieval in Peer-to-Peer Networks
Query processing in traditional information management systems has moved from an exact match model to more flexible paradigms allowing cooperative retrieval by aggregating the dat...
Wolf-Tilo Balke, Wolfgang Nejdl, Wolf Siberski, Uw...
CIKM
2008
Springer
14 years 11 months ago
Academic conference homepage understanding using constrained hierarchical conditional random fields
We address the problem of academic conference homepage understanding for the Semantic Web. This problem consists of three labeling tasks - labeling conference function pages, func...
Xin Xin, Juanzi Li, Jie Tang, Qiong Luo
95
Voted
ISCA
2006
IEEE
144views Hardware» more  ISCA 2006»
14 years 9 months ago
Conditional Memory Ordering
Conventional relaxed memory ordering techniques follow a proactive model: at a synchronization point, a processor makes its own updates to memory available to other processors by ...
Christoph von Praun, Harold W. Cain, Jong-Deok Cho...
CVPR
2006
IEEE
15 years 11 months ago
Image Matching Using Photometric Information
Image matching is an essential task in many computer vision applications. It is obvious that thorough utilization of all available information is critical for the success of match...
Michael Kolomenkin, Ilan Shimshoni