Sciweavers

2826 search results - page 374 / 566
» A resource-based analysis of IT sourcing
Sort
View
HICSS
2006
IEEE
189views Biometrics» more  HICSS 2006»
15 years 8 months ago
Barriers to Information Access across Languages on the Internet: Network and Language Effects
This paper investigates the role of language in accessing information on the Internet. We combined data about website visitors through log-file analysis with data about web-hosts ...
Anett Kralisch, Thomas Mandl
ICRA
2006
IEEE
185views Robotics» more  ICRA 2006»
15 years 8 months ago
Automatic Self-calibration of a Vision System during Robot Motion
— This paper presents a new technique to estimate the extrinsic parameters of a robot-vision sensor system. More in general, this technique can be adopted to calibrate any robot ...
Agostino Martinelli, Davide Scaramuzza, Roland Sie...
128
Voted
IPPS
2006
IEEE
15 years 8 months ago
Parallel morphological processing of hyperspectral image data on heterogeneous networks of computers
Recent advances in space and computer technologies are revolutionizing the way remotely sensed data is collected, managed and interpreted. The development of efficient techniques ...
Antonio J. Plaza
IRI
2006
IEEE
15 years 8 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
122
Voted
WCRE
2006
IEEE
15 years 8 months ago
Extracting Output Formats from Executables
We describe the design and implementation of FFE/x86 (File-Format Extractor for x86), an analysis tool that works on stripped executables (i.e., neither source code nor debugging ...
Junghee Lim, Thomas W. Reps, Ben Liblit