Sciweavers

662 search results - page 62 / 133
» IPSec: Performance Analysis and Enhancements
Sort
View
ICDCIT
2004
Springer
15 years 3 months ago
Secure Requirements Elicitation Through Triggered Message Sequence Charts
Abstract. This paper argues for performing information-flow-based security analysis in the first phaseof the software development life cycle itself ie in the requirements elicita...
Arnab Ray, Bikram Sengupta, Rance Cleaveland
ACL
2009
14 years 7 months ago
The Contribution of Stylistic Information to Content-based Mobile Spam Filtering
Content-based approaches to detecting mobile spam to date have focused mainly on analyzing the topical aspect of a SMS message (what it is about) but not on the stylistic aspect (...
Dae-Neung Sohn, Jung-Tae Lee, Hae-Chang Rim
IJRR
2010
199views more  IJRR 2010»
14 years 4 months ago
Visual Tracking via Particle Filtering on the Affine Group
We propose a particle filtering-based visual tracker, in which the affine group is treated as the state. We first develop a general particle filtering algorithm that explicitly tak...
Junghyun Kwon, Frank C. Park
ISCA
1997
IEEE
135views Hardware» more  ISCA 1997»
15 years 2 months ago
The Design and Analysis of a Cache Architecture for Texture Mapping
The effectiveness of texture mapping in enhancing the realism of computer generated imagery has made support for real-time texture mapping a critical part of graphics pipelines. D...
Ziyad S. Hakura, Anoop Gupta
TASLP
2010
188views more  TASLP 2010»
14 years 8 months ago
MusicBox: Personalized Music Recommendation Based on Cubic Analysis of Social Tags
—Social tagging is becoming increasingly popular in music information retrieval (MIR). It allows users to tag music items like songs, albums, or artists. Social tags are valuable...
Alexandros Nanopoulos, Dimitrios Rafailidis, Panag...