Sciweavers

27692 search results - page 279 / 5539
» Where is ...
Sort
View
110
Voted
CN
2010
107views more  CN 2010»
14 years 11 months ago
Secure multicast in IPTV services
Technological evolution is leading telecommunications to all-IP networks where multiple services are transported as IP packets. Among these are the group communications services w...
António Pinto, Manuel Ricardo
107
Voted
ACL
2010
14 years 10 months ago
Dependency Parsing and Projection Based on Word-Pair Classification
In this paper we describe an intuitionistic method for dependency parsing, where a classifier is used to determine whether a pair of words forms a dependency edge. And we also pro...
Wenbin Jiang, Qun Liu
ACSAC
2010
IEEE
14 years 10 months ago
Two methodologies for physical penetration testing using social engineering
Penetration tests on IT systems are sometimes coupled with physical penetration tests and social engineering. In physical penetration tests where social engineering is allowed, th...
Trajce Dimkov, Wolter Pieters, Pieter H. Hartel
119
Voted
BMVC
2010
14 years 10 months ago
Sparse Sparse Bundle Adjustment
Sparse Bundle Adjustment (SBA) is a method for simultaneously optimizing a set of camera poses and visible points. It exploits the sparse primary structure of the problem, where c...
Kurt Konolige
129
Voted
COLT
2010
Springer
14 years 10 months ago
Robust Selective Sampling from Single and Multiple Teachers
We present a new online learning algorithm in the selective sampling framework, where labels must be actively queried before they are revealed. We prove bounds on the regret of ou...
Ofer Dekel, Claudio Gentile, Karthik Sridharan