Sciweavers

134 search results - page 22 / 27
» Weakly Monotonic Propagators
Sort
View
IWAN
2004
Springer
15 years 2 months ago
Distributed Instrusion Prevention in Active and Extensible Networks
The proliferation of computer viruses and Internet worms has had a major impact on the Internet Community. Cleanup and control of malicious software (malware) has become a key prob...
Todd S. Sproull, John W. Lockwood
CP
2003
Springer
15 years 2 months ago
A Synthesis of Constraint Satisfaction and Constraint Solving
Abstract. This paper offers a critique of the framework of Constraint Satisfaction Problems. While this framework has been successful in studying search techniques, and has inspire...
Michael J. Maher
CIVR
2010
Springer
299views Image Analysis» more  CIVR 2010»
15 years 6 hour ago
Co-reranking by mutual reinforcement for image search
Most existing reranking approaches to image search focus solely on mining "visual" cues within the initial search results. However, the visual information cannot always ...
Ting Yao, Tao Mei, Chong-Wah Ngo
USENIX
2008
14 years 12 months ago
ConfiDNS: Leveraging Scale and History to Detect Compromise
While cooperative DNS resolver systems, such as CoDNS, have demonstrated improved reliability and performance over standard approaches, their security has been weaker, since any c...
Lindsey Poole, Vivek S. Pai
COLING
2000
14 years 11 months ago
XML and Multilingual Document Authoring: Convergent Trends
Typical approaches to XML authoring view a XML document as a mixture of structure (the tags) and surface (text between the tags). We advocate a radical approach where the surface ...
Marc Dymetman, Veronika Lux, Aarne Ranta