Sciweavers

5918 search results - page 1135 / 1184
» A view of cloud computing
Sort
View
123
Voted
ETRA
2006
ACM
114views Biometrics» more  ETRA 2006»
15 years 9 months ago
Causal saliency effects during natural vision
Salient stimuli, such as color or motion contrasts, attract human attention, thus providing a fast heuristic for focusing limited neural resources on behaviorally relevant sensory...
Ran Carmi, Laurent Itti
150
Voted
IMC
2006
ACM
15 years 9 months ago
Measurement based analysis, modeling, and synthesis of the internet delay space
Understanding the characteristics of the Internet delay space (i.e., the all-pairs set of static round-trip propagation delays among edge networks in the Internet) is important fo...
Bo Zhang, T. S. Eugene Ng, Animesh Nandi, Rudolf H...
164
Voted
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
15 years 9 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...
117
Voted
INFOVIS
2005
IEEE
15 years 9 months ago
Parallel Sets: Visual Analysis of Categorical Data
The discrete nature of categorical data makes it a particular challenge for visualization. Methods that work very well for continuous data are often hardly usable with categorical...
Fabian Bendix, Robert Kosara, Helwig Hauser
129
Voted
IWIA
2005
IEEE
15 years 9 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
« Prev « First page 1135 / 1184 Last » Next »