Sciweavers

1445 search results - page 184 / 289
» XPath query containment
Sort
View
131
Voted
NDSS
2005
IEEE
15 years 9 months ago
DNS-based Detection of Scanning Worms in an Enterprise Network
Worms are arguably the most serious security threat facing the Internet. Seeking a detection technique that is both sufficiently efficient and accurate to enable automatic conta...
David Whyte, Evangelos Kranakis, Paul C. van Oorsc...
105
Voted
CIVR
2005
Springer
15 years 9 months ago
Person Spotting: Video Shot Retrieval for Face Sets
Matching people based on their imaged face is hard because of the well known problems of illumination, pose, size and expression variation. Indeed these variations can exceed those...
Josef Sivic, Mark Everingham, Andrew Zisserman
118
Voted
DAWAK
2005
Springer
15 years 9 months ago
Event-Feeded Dimension Solution
Abstract. From the point of view of a data warehouse system its part of collecting and receiving information from other systems is crucial for all subsequent business intelligence ...
Tho Manh Nguyen, Jaromir Nemec, Martin Windisch
137
Voted
ISMIR
2005
Springer
179views Music» more  ISMIR 2005»
15 years 9 months ago
Discovering and Visualizing Prototypical Artists by Web-Based Co-Occurrence Analysis
Detecting artists that can be considered as prototypes for particular genres or styles of music is an interesting task. In this paper, we present an approach that ranks artists ac...
Markus Schedl, Peter Knees, Gerhard Widmer
119
Voted
MKM
2004
Springer
15 years 9 months ago
Integrated Semantic Browsing of the Mizar Mathematical Library for Authoring Mizar Articles
Abstract. The Mizar system is equipped with a very large library containing tens of thousands of theorems and thousands of definitions, which often use overloaded notation. For e...
Grzegorz Bancerek, Josef Urban