Sciweavers

1912 search results - page 316 / 383
» Don't Compare Averages
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 8 days ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
CHI
2008
ACM
16 years 8 days ago
DRAGON: a direct manipulation interface for frame-accurate in-scene video navigation
We present DRAGON, a direct manipulation interaction technique for frame-accurate navigation in video scenes. This technique benefits tasks such as professional and amateur video ...
Thorsten Karrer, Malte Weiss, Eric Lee, Jan Borche...
CHI
2005
ACM
16 years 8 days ago
EyeWindows: evaluation of eye-controlled zooming windows for focus selection
In this paper, we present an attentive windowing technique that uses eye tracking, rather than manual pointing, for focus window selection. We evaluated the performance of 4 focus...
David Fono, Roel Vertegaal
VLSID
2004
IEEE
125views VLSI» more  VLSID 2004»
16 years 8 days ago
Energy-Optimizing Source Code Transformations for OS-driven Embedded Software
The increasing software content of battery-powered embedded systems has fueled much interest in techniques for developing energyefficient embedded software. Source code transforma...
Yunsi Fei, Srivaths Ravi, Anand Raghunathan, Niraj...
VLSID
2001
IEEE
200views VLSI» more  VLSID 2001»
16 years 7 days ago
Evaluation of the Traffic-Performance Characteristics of System-on-Chip Communication Architectures
The emergence of several communication architectures for System-on-Chips provides designers with a variety of design alternatives. In addition, the need to customize the system ar...
Kanishka Lahiri, Sujit Dey, Anand Raghunathan