منابع مشابه
Message Submission
1. Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2. Document Information . . . . . . . . . . . . . . . . . . . 3 2.1. Definitions of Terms Used in this Memo . . . . . . . . . 3 2.2. Conventions Used in this Document . . . . . . . . . . . 4 3. Message Submission . . . . . . . . . . . . . . . . . . . . . 4 3.1. Submission Identification . . . . . . . . . . . . . . . 4 3.2. Messag...
متن کاملMODELING FASHION Anonymous ICME submission
We propose a method to try to model fashionable dresses in this paper. We first discover common visual patterns that appear in dress images using a human-in-the-loop, active clustering approach. A fashionable dress is expected to contain certain visual patterns which make it fashionable. An approach is proposed to jointly identify fashionable visual patterns and learn a discriminative fashion c...
متن کاملMessage Submission for Mail
This memo splits message submission from message relay, allowing each service to operate according to its own rules (for security, policy, etc.), and specifies what actions are to be taken by a submission server. Message relay is unaffected, and continues to use SMTP over port 25. When conforming to this document, message submission uses the protocol specified here, normally over port 587. This...
متن کاملA Fair Anonymous Submission and Review System
Reputation systems play an important role in many Internet communities. They allow individuals to estimate other individual’s behavior during interactions. However, a more privacy-friendly reputation system is desirable while maintaining its trustworthiness. This paper presents a fair anonymous submission and review system. The review process is reputation-based and provides better anonymity pr...
متن کاملWhere is my Advisor ? Anonymous CVPR submission
We present a novel method to a unique problem solved in a new way: we use vision technology to aid in the process of vision research. Specifically, we develop an innovative algorithm to determine the presence of our advisor. By creating a system that will identify when our advisor’s office door is open, we can attempt to corner him only when necessary, remaining at our desk for longer periods o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2018
ISSN: 1545-5971
DOI: 10.1109/tdsc.2016.2556659