Sciweavers

5934 search results - page 1152 / 1187
» Detecting a Network Failure
Sort
View
ACSAC
2006
IEEE
15 years 5 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
BIBE
2006
IEEE
184views Bioinformatics» more  BIBE 2006»
15 years 5 months ago
A Language Modeling Text Mining Approach to the Annotation of Protein Community
This paper discusses an ontology based language modeling text mining approach to the annotation of protein community. Communities appear to play an important role in the functional...
Xiaodan Zhang, Daniel Duanqing Wu, Xiaohua Zhou, X...
ICMCS
2006
IEEE
235views Multimedia» more  ICMCS 2006»
15 years 5 months ago
An Event-Driven Sports Video Adaptation for the MPEG-21 DIA Framework
We present an event-driven video adaptation system in this paper. Events are detected by audio/video analysis and annotated by the description schemes (DSs) provided by MPEG-7 Mul...
Min Xu, Jiaming Li, Yiqun Hu, Liang-Tien Chia, Bu-...
ICNP
2005
IEEE
15 years 5 months ago
Robust Multiclass Signaling Overload Control
We propose multi-class signaling overload control algorithms, for telecommunication switches, that are robust against different input traffic patterns and system upgrades. In ord...
Sneha Kumar Kasera, José Pinheiro, Catherin...
UIST
2004
ACM
15 years 4 months ago
"Killer App" of wearable computing: wireless force sensing body protectors for martial arts
Ubiquitous and Wearable Computing both have the goal of pushing the computer into the background, supporting all kinds of human activities. Application areas include areas such as...
Ed Huai-hsin Chi, Jin Song, Greg Corbin
« Prev « First page 1152 / 1187 Last » Next »