Sciweavers

2932 search results - page 414 / 587
» Higher order mining
Sort
View
104
Voted
EICS
2009
ACM
15 years 7 months ago
A toolkit for peer-to-peer distributed user interfaces: concepts, implementation, and applications
In this paper we present a software toolkit for deploying peer-topeer distributed graphical user interfaces across four dimensions: multiple displays, multiple platforms, multiple...
Jérémie Melchior, Donatien Grolaux, ...
96
Voted
SIGIR
2009
ACM
15 years 7 months ago
Spam filter evaluation with imprecise ground truth
When trained and evaluated on accurately labeled datasets, online email spam filters are remarkably effective, achieving error rates an order of magnitude better than classifie...
Gordon V. Cormack, Aleksander Kolcz
ARC
2010
Springer
178views Hardware» more  ARC 2010»
15 years 7 months ago
An Analysis of Delay Based PUF Implementations on FPGA
Physical Unclonable Functions promise cheap, efficient, and secure identification and authentication of devices. In FPGA devices, PUFs may be instantiated directly from FPGA fabri...
Sergey Morozov, Abhranil Maiti, Patrick Schaumont
89
Voted
ACHI
2008
IEEE
15 years 7 months ago
Spatial Auditory Interface for an Embedded Communication Device in a Car
In this paper we evaluate the safety of the driver when using an embedded communication device while driving. As a part of our research, four different tasks were preformed with t...
Jaka Sodnik, Saso Tomazic, Christina Dicke, Mark B...
AINA
2008
IEEE
15 years 7 months ago
An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot
When traditional firewall and intrusion detection systems (IDS) are used to detect possible attacks from the network, they often make wrong decisions and block the legitimate conn...
Babak Khosravifar, Jamal Bentahar