Sciweavers

634 search results - page 108 / 127
» Finding trendsetters in information networks
Sort
View
ARCSF
2008
15 years 1 months ago
Probabilistic Prediction of Student Affect from Hand Gestures
Abstract-- Affective information is vital for effective human-tohuman communication. Likewise, human-to-computer communication could be potentiated by an "affective barometer&...
Abdul Rehman Abbasi, Matthew N. Dailey, Nitin V. A...
ISSA
2004
15 years 1 months ago
Categorizing Vulnerabilities Using Data Clustering Techniques
Vulnerability scanning is one of the proactive information security technologies in the Internet and network security domain. However, the current vulnerability scanner (VS) produ...
Yun (Lillian) Li
LISA
2001
15 years 1 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
WSCG
2004
165views more  WSCG 2004»
15 years 1 months ago
Client-Server Infrastructure for Interactive 3D Multi-User Environments
Multi-user environments, using 3D graphics, more and more find their way into areas like e-business, entertainment and cooperative work. Due to the increasing capabilities of hard...
Ingo Soetebier, Horst Birthelmer, Jörg Sahm
ICDE
2005
IEEE
128views Database» more  ICDE 2005»
16 years 1 months ago
Exploiting Correlated Attributes in Acquisitional Query Processing
Sensor networks and other distributed information systems (such as the Web) must frequently access data that has a high per-attribute acquisition cost, in terms of energy, latency...
Amol Deshpande, Carlos Guestrin, Wei Hong, Samuel ...