Sciweavers

21324 search results - page 4028 / 4265
» Making the case for computing
Sort
View
IMC
2004
ACM
15 years 9 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese
127
Voted
ISSTA
2004
ACM
15 years 9 months ago
Verifying process models built using parameterized state machines
Software process and workflow languages are increasingly used to define loosely-coupled systems of systems. These languages focus on coordination issues such as data flow and c...
Barbara Staudt Lerner
153
Voted
IUI
2004
ACM
15 years 9 months ago
An intelligent 3D user interface adapting to user control behaviors
The WALK mode is one of the most common navigation interfaces for 3D virtual environments. However, due to the limited view angle and low frame rate, users are often blocked by ob...
Tsai-Yen Li, Shu-Wei Hsu
118
Voted
JCDL
2004
ACM
128views Education» more  JCDL 2004»
15 years 9 months ago
Panorama: extending digital libraries with topical crawlers
A large amount of research, technical and professional documents are available today in digital formats. Digital libraries are created to facilitate search and retrieval of inform...
Gautam Pant, Kostas Tsioutsiouliklis, Judy Johnson...
JCDL
2004
ACM
125views Education» more  JCDL 2004»
15 years 9 months ago
Generating fuzzy semantic metadata describing spatial relations from images using the R-histogram
Automatic generation of semantic metadata describing spatial relations is highly desirable for image digital libraries. Relative spatial relations between objects in an image conv...
Yuhang Wang, Fillia Makedon, James Ford, Li Shen, ...
« Prev « First page 4028 / 4265 Last » Next »