Sciweavers

450 search results - page 80 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
82
Voted
BMVC
2010
14 years 7 months ago
Toward Robust Action Retrieval in Video
Retrieving human actions from video databases is a paramount but challenging task in computer vision. In this work, we develop such a framework for robustly recognizing human acti...
Samy Bakheet, Ayoub Al-Hamadi, Bernd Michaelis, Us...
JDCTA
2010
125views more  JDCTA 2010»
14 years 4 months ago
Safety technologies impacts survey in M-services security provision
Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools t...
Fatemeh NasserEslami, Fatemeh Saghafi
CONEXT
2005
ACM
14 years 11 months ago
Location based placement of whole distributed systems
The high bandwidth and low latency of the modern internet has made possible the deployment of distributed computing platforms. The XenoServer platform provides a distributed compu...
David Spence, Jon Crowcroft, Steven Hand, Timothy ...
ITIIS
2008
151views more  ITIIS 2008»
14 years 9 months ago
Bandwidth Management of WiMAX Systems and Performance Modeling
WiMAX has been introduced as a competitive alternative for metropolitan broadband wireless access technologies. It is connection oriented and it can provide very high data rates, ...
Yue Li, Jianhua He, Weixi Xing
TPDS
2008
118views more  TPDS 2008»
14 years 9 months ago
Interaction of ISPs: Distributed Resource Allocation and Revenue Maximization
The Internet is a hierarchical architecture comprising heterogeneous entities of privately owned infrastructures, where higher level Internet service providers (ISPs) supply conne...
Sam C. M. Lee, Joe Wenjie Jiang, Dah-Ming Chiu, Jo...