Sciweavers

452 search results - page 70 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
DSN
2005
IEEE
15 years 3 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
MTA
2011
263views Hardware» more  MTA 2011»
14 years 4 months ago
Event detection and recognition for semantic annotation of video
Research on methods for detection and recognition of events and actions in videos is receiving an increasing attention from the scientific community, because of its relevance for ...
Lamberto Ballan, Marco Bertini, Alberto Del Bimbo,...
HCI
2007
14 years 11 months ago
A New Method for Multi-finger Detection Using a Regular Diffuser
In this paper, we developed a fingertip finding algorithm working with a regular diffuser. The proposed algorithm works on images captured by infra-red cameras, settled on one side...
Li-Wei Chan, Yi-Fan Chuang, Yi-Wei Chia, Yi-Ping H...
ICWSM
2010
14 years 11 months ago
TweetMotif: Exploratory Search and Topic Summarization for Twitter
We present TweetMotif, an exploratory search application for Twitter. Unlike traditional approaches to information retrieval, which present a simple list of messages, TweetMotif g...
Brendan O'Connor, Michel Krieger, David Ahn
CHI
2010
ACM
15 years 2 months ago
Clutching at straws: using tangible interaction to provide non-visual access to graphs
We present a tangible user interface (TUI) called Tangible Graph Builder, that has been designed to allow visually impaired users to access graph and chart-based data. We describe...
David K. McGookin, Euan Robertson, Stephen A. Brew...