Sciweavers

21324 search results - page 4166 / 4265
» Making the case for computing
Sort
View
ISW
2009
Springer
15 years 4 months ago
Automated Spyware Collection and Analysis
Various online studies on the prevalence of spyware attest overwhelming numbers (up to 80%) of infected home computers. However, the term spyware is ambiguous and can refer to anyt...
Andreas Stamminger, Christopher Kruegel, Giovanni ...
SSD
2009
Springer
149views Database» more  SSD 2009»
15 years 4 months ago
Analyzing Trajectories Using Uncertainty and Background Information
A key issue in clustering data, regardless the algorithm used, is the definition of a distance function. In the case of trajectory data, different distance functions have been pro...
Bart Kuijpers, Bart Moelans, Walied Othman, Alejan...
MM
2009
ACM
127views Multimedia» more  MM 2009»
15 years 4 months ago
A crowdsourceable QoE evaluation framework for multimedia content
Until recently, QoE (Quality of Experience) experiments had to be conducted in academic laboratories; however, with the advent of ubiquitous Internet access, it is now possible to...
Kuan-Ta Chen, Chen-Chi Wu, Yu-Chun Chang, Chin-Lau...
PETRA
2009
ACM
15 years 4 months ago
A technological infrastructure design for a pediatric oncology network
In Italy, the service of Pediatric oncology is very centralized and granted by high-specialized medical structures. In the Italian Regione Campania there are just few of such medi...
Aniello Murano
SACMAT
2009
ACM
15 years 4 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
« Prev « First page 4166 / 4265 Last » Next »