Sciweavers

861 search results - page 172 / 173
» Research through design as a method for interaction design r...
Sort
View
CN
2007
91views more  CN 2007»
13 years 5 months ago
On investigating overlay service topologies
Recently, a moderate amount of work has been reported on the use of overlay networks to support value-added network services, such as multicasting, Quality of Service (QoS), secur...
Zhi Li, Prasant Mohapatra
ACSC
2006
IEEE
13 years 11 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi
ECAI
1998
Springer
13 years 9 months ago
What You See Is What You Meant: direct knowledge editing with natural language feedback
Many kinds of knowledge-based system would be easier to develop and maintain if domain experts (as opposed to knowledge engineers) were in a position to define and edit the knowled...
Richard Power, Donia Scott, Roger Evans
CSUR
2004
149views more  CSUR 2004»
13 years 5 months ago
A review of vessel extraction techniques and algorithms
Vessel segmentation algorithms are the critical components of circulatory blood vessel analysis systems. We present a survey of vessel extraction techniques and algorithms. We put ...
Cemil Kirbas, Francis K. H. Quek
ASUNAM
2011
IEEE
12 years 5 months ago
MultiAspectForensics: Pattern Mining on Large-Scale Heterogeneous Networks with Tensor Analysis
—Modern applications such as web knowledge base, network traffic monitoring and online social networks have made available an unprecedented amount of network data with rich type...
Koji Maruhashi, Fan Guo, Christos Faloutsos