Sciweavers

250 search results - page 32 / 50
» HOMES: highway operation monitoring and evaluation system
Sort
View
USENIX
2008
15 years 2 months ago
Vx32: Lightweight User-level Sandboxing on the x86
Code sandboxing is useful for many purposes, but most sandboxing techniques require kernel modifications, do not completely isolate guest code, or incur substantial performance co...
Bryan Ford, Russ Cox
ECCV
2008
Springer
16 years 1 months ago
An Incremental Learning Method for Unconstrained Gaze Estimation
Abstract. This paper presents an online learning algorithm for appearancebased gaze estimation that allows free head movement in a casual desktop environment. Our method avoids the...
Yusuke Sugano, Yasuyuki Matsushita, Yoichi Sato, H...
IAT
2007
IEEE
15 years 6 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...
RE
2010
Springer
14 years 6 months ago
A goal-based framework for contextual requirements modeling and analysis
Abstract Requirements Engineering (RE) research often ignores, or presumes a uniform nature of the context in which the system operates. This assumption is no longer valid in emerg...
Raian Ali, Fabiano Dalpiaz, Paolo Giorgini
ISM
2008
IEEE
273views Multimedia» more  ISM 2008»
14 years 11 months ago
Understanding Data-Driven Decision Support Systems
It is important for managers and Information Technology professionals to understand data-driven decision support systems and how such systems can provide business intelligence and ...
Daniel J. Power