Sciweavers

53390 search results - page 10664 / 10678
» Computer Systems Analysis
Sort
View
149
Voted
MM
2010
ACM
191views Multimedia» more  MM 2010»
15 years 16 days ago
Quantifying tag representativeness of visual content of social images
Social tags describe images from many aspects including the visual content observable from the images, the context and usage of images, user opinions and others. Not all tags are ...
Aixin Sun, Sourav S. Bhowmick
193
Voted
SADFE
2010
IEEE
15 years 15 days ago
Fonts for Forensics
: Like other latent evidence that cannot be directly perceived by people, bit sequences have to be presented through tools. Presentations of digital forensic evidence often involve...
Fred Cohen
153
Voted
SIGSOFT
2010
ACM
15 years 15 days ago
Growth of newcomer competence: challenges of globalization
The transfer of entire projects to offshore locations, the aging and renewal of core developers in legacy products, the recruiting in fast growing Internet companies, and the part...
Minghui Zhou, Audris Mockus
150
Voted
SOCIALCOM
2010
15 years 15 days ago
GDC: Group Discovery Using Co-location Traces
Smart phones can collect and share Bluetooth co-location traces to identify ad hoc or semi-permanent social groups. This information, known to group members but otherwise unavailab...
Steve Mardenfeld, Daniel Boston, Susan Juan Pan, Q...
137
Voted
TMA
2010
Springer
150views Management» more  TMA 2010»
15 years 15 days ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
« Prev « First page 10664 / 10678 Last » Next »