Sciweavers

60 search results - page 12 / 12
» Principles of Selection for Electronic Resources
Sort
View
ICCV
2005
IEEE
14 years 7 months ago
Active Search for Real-Time Vision
In most cases when information is to be extracted from an image, there are priors available on the state of the world and therefore on the detailed measurements which will be obta...
Andrew J. Davison
AAAI
1994
13 years 6 months ago
Automated Postediting of Documents
Large amounts of low- to medium-quality English texts are now being produced by machine translation (MT) systems, optical character readers (OCR), and non-native speakers of Engli...
Kevin Knight, Ishwar Chander
IJDE
2006
95views more  IJDE 2006»
13 years 5 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
INFOCOM
2010
IEEE
13 years 3 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman

Publication
279views
15 years 3 months ago
Potential Networking Applications of Global Positioning Systems (GPS)
Global Positioning System (GPS) Technology allows precise determination of location, velocity, direction, and time. The price of GPS receivers is falling rapidly and the applicatio...
G. Dommety and Raj Jain