Sciweavers

405 search results - page 51 / 81
» Linking and Messaging from Real Paper in the Paper PDA
Sort
View
JCS
2010
135views more  JCS 2010»
14 years 8 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
CASES
2004
ACM
15 years 3 months ago
High-level power analysis for on-chip networks
As on-chip networks become prevalent in multiprocessor systemson-a-chip and multi-core processors, they will be an integral part of the design flow of such systems. With power in...
Noel Eisley, Li-Shiuan Peh
INFOCOM
2009
IEEE
15 years 4 months ago
Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints
Continuous monitoring and diagnosis of network performance are of crucial importance for the Internet access service and virtual private network (VPN) service providers. Various o...
Yao Zhao, Zhaosheng Zhu, Yan Chen, Dan Pei, Jia Wa...
PAA
2008
14 years 9 months ago
Human action recognition in videos based on the Transferable Belief Model
Abstract This paper focuses on human behavior recognition where the main problem is to bridge the semantic gap between the analogue observations of the real world and the symbolic ...
Emmanuel Ramasso, Costas Panagiotakis, Denis Pelle...
ICMCS
2005
IEEE
87views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Performance of Multiple Description Coding in Sensor Networks with Finite Buffers
Sensor networks are usually dense networks where the network diversity can be exploited in order to overcome failures. In this paper, we study the use of multiple description tech...
Enrico Baccaglini, Guillermo Barrenetxea, Baltasar...