Sciweavers

1310 search results - page 209 / 262
» Learning the k in k-means
Sort
View
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 4 months ago
Security in All-Optical Networks: Self-Organization and Attack Avoidance
—While transparent WDM optical networks become more and more popular as the basis of the Next Generation Internet (NGI) infrastructure, such networks raise many unique security i...
Jae-Seung Yeom, Ozan K. Tonguz, Gerardo A. Casta&n...
ICOST
2007
Springer
15 years 4 months ago
Distributed Vision-Based Accident Management for Assisted Living
We consider the problem of assisting vulnerable people and their carers to reduce the occurrence, and concomitant consequences, of accidents in the home. A wireless sensor network ...
Hamid K. Aghajan, Juan Carlos Augusto, Chen Wu, Pa...
ICSE
2007
IEEE-ACM
15 years 4 months ago
Enhancing Software Testing by Judicious Use of Code Coverage Information
Recently, tools for the analysis and visualization of code coverage have become widely available. At first glance, their value in assessing and improving the quality of automated ...
Stefan Berner, Roland Weber, Rudolf K. Keller
RAID
2007
Springer
15 years 3 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
HICSS
2006
IEEE
128views Biometrics» more  HICSS 2006»
15 years 3 months ago
Examining the Cognitive Style Effects on the Acceptance of Online Community Weblog Systems
Weblog is increasingly important over time with researchers anxious to learn why millions of Internet users are so eager to post their own diary on the web everyday. This study co...
Will Wai-Kit Ma, Pu Li, Theodore H. K. Clark