Sciweavers

4636 search results - page 809 / 928
» Application of Linguistic Techniques for Use Case Analysis
Sort
View
ESORICS
2007
Springer
15 years 4 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
ICMCS
2006
IEEE
215views Multimedia» more  ICMCS 2006»
15 years 4 months ago
Experiential Sampling based Foreground/Background Segmentation for Video Surveillance
Segmentation of foreground and background has been an important research problem arising out of many applications including video surveillance. A method commonly used for segmenta...
Pradeep K. Atrey, Vinay Kumar, Anurag Kumar, Mohan...
ICMCS
2006
IEEE
148views Multimedia» more  ICMCS 2006»
15 years 4 months ago
Directing Attention in Online Aggregate Sensor Streams via Auditory Blind Value Assignment
Multiparty collaborative applications in which groups of people act in concert to achieve some real-world goal abound. In these situations, it is useful for a central planning age...
Robert Malkin, Datong Chen, Jie Yang, Alex Waibel
SIGIR
2006
ACM
15 years 4 months ago
Formal models for expert finding in enterprise corpora
Searching an organization’s document repositories for experts provides a cost effective solution for the task of expert finding. We present two general strategies to expert se...
Krisztian Balog, Leif Azzopardi, Maarten de Rijke
SIGMOD
2006
ACM
121views Database» more  SIGMOD 2006»
15 years 4 months ago
Derby/S: a DBMS for sample-based query answering
Although approximate query processing is a prominent way to cope with the requirements of data analysis applications, current database systems do not provide integrated and compre...
Anja Klein, Rainer Gemulla, Philipp Rösch, Wo...