Sciweavers

582 search results - page 116 / 117
» Case Study On Social Engineering Techniques for Persuasion
Sort
View
CCS
2007
ACM
13 years 12 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
CIVR
2007
Springer
112views Image Analysis» more  CIVR 2007»
13 years 12 months ago
Canonical image selection from the web
The vast majority of the features used in today’s commercially deployed image search systems employ techniques that are largely indistinguishable from text-document search – t...
Yushi Jing, Shumeet Baluja, Henry A. Rowley
MM
2004
ACM
116views Multimedia» more  MM 2004»
13 years 11 months ago
A taxonomy for multimedia service composition
The realization of multimedia systems still heavily relies on building monolithic systems that need to be reengineered for every change in the application and little of which can ...
Klara Nahrstedt, Wolf-Tilo Balke
PASTE
2010
ACM
13 years 11 months ago
Opportunities for concurrent dynamic analysis with explicit inter-core communication
Multicore is now the dominant processor trend, and the number of cores is rapidly increasing. The paradigm shift to multicore forces the redesign of the software stack, which incl...
Jungwoo Ha, Stephen P. Crago
AAAI
1998
13 years 7 months ago
Producing BT's Yellow Pages with Formation
This case study illustrates how the adoption of AI technology can bene t smaller companies as well as major corporations. Pindar Set is a small UK company which has originated the...
Gail Anderson, Andrew Casson-du Mont, Ann Macintos...