Sciweavers

24529 search results - page 4515 / 4906
» Computing on Authenticated Data
Sort
View
ISI
2008
Springer
15 years 5 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....
130
Voted
IJHPCA
2006
125views more  IJHPCA 2006»
15 years 5 months ago
Complexity Results for Collective Communications on Heterogeneous Platforms
In this paper, we consider the communications involved in the execution of a complex application, deployed on a heterogeneous platform. Such applications extensively use macro-com...
Olivier Beaumont, Loris Marchal, Yves Robert
IVC
2008
117views more  IVC 2008»
15 years 5 months ago
Direct type-specific conic fitting and eigenvalue bias correction
A new method to fit specific types of conics to scattered data points is introduced. Direct, specific fitting of ellipses and hyperbolae is achieved by imposing a quadratic constr...
Matthew Harker, Paul O'Leary, Paul J. Zsombor-Murr...
IVC
2008
135views more  IVC 2008»
15 years 5 months ago
Multi-modal tracking of people using laser scanners and video camera
Inspite extensive research on visual tracking of multiple people in computer vision area, the robustness and usability of visual trackers are still discouraging. Recently, a few l...
Jinshi Cui, Hongbin Zha, Huijing Zhao, Ryosuke Shi...
JAL
2008
89views more  JAL 2008»
15 years 5 months ago
Experimenting with parallelism for the instantiation of ASP programs
Abstract. In the last few years, the microprocessors technologies have been definitely moving to multi-core architectures, in order to improve performances as well as reduce power ...
Francesco Calimeri, Simona Perri, Francesco Ricca
« Prev « First page 4515 / 4906 Last » Next »