Sciweavers

12673 search results - page 2407 / 2535
» Learning while designing
Sort
View
140
Voted
IMC
2004
ACM
15 years 10 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese
151
Voted
JCDL
2004
ACM
175views Education» more  JCDL 2004»
15 years 10 months ago
Supporting personal collections across digital libraries in spatial hypertext
Creating, maintaining, or using a digital library requires the manipulation of digital documents. Information workspaces provide a visual representation allowing users to collect,...
Frank M. Shipman III, Hao-wei Hsieh, J. Michael Mo...
158
Voted
MM
2004
ACM
106views Multimedia» more  MM 2004»
15 years 10 months ago
Probabilistic delay guarantees using delay distribution measurement
Carriers increasingly differentiate their wide-area connectivity offerings by means of customized services, such as virtual private networks (VPN) with Quality of Service (QoS) g...
Kartik Gopalan, Tzi-cker Chiueh, Yow-Jian Lin
136
Voted
MM
2004
ACM
158views Multimedia» more  MM 2004»
15 years 10 months ago
"Sousveillance": inverse surveillance in multimedia imaging
This is a personal narrative that began 30 years ago as a childhood hobby, of wearing and implanting various sensors, effectors, and multimedia computation in order to re-define...
Steve Mann
MOBICOM
2004
ACM
15 years 10 months ago
Power conservation and quality of surveillance in target tracking sensor networks
Target tracking is an important application of wireless sensor networks. In this application, the sensor nodes collectively monitor and track the movement of an event or target ob...
Chao Gui, Prasant Mohapatra
« Prev « First page 2407 / 2535 Last » Next »