Sciweavers

4049 search results - page 640 / 810
» Neural Network Trainer through Computer Networks
Sort
View
SERSCISA
2009
Springer
15 years 10 months ago
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach
Many visual similarity-based phishing page detectors have been developed to detect phishing webpages, however, scammers now create polymorphic phishing pages to breach the defense ...
Ieng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-T...
ICDCSW
2008
IEEE
15 years 9 months ago
Towards Cyber-Physical Holodeck Systems Via Physically Rendered Environments (PRE's)
We present an early vision of a cyber-physical environment in which computer controlled rendering of physical surfaces, terrains, and environments is achieved by manipulating grid...
Veljko Krunic, Richard Han
CCGRID
2006
IEEE
15 years 9 months ago
GridFTP-APT: Automatic Parallelism Tuning Mechanism for Data Transfer Protocol GridFTP
GridFTP has been used as a data transfer protocol to effectively transfer a large volume of data in Grid computing. GridFTP supports a feature called parallel data transfer that i...
Takeshi Ito, Hiroyuki Ohsaki, Makoto Imase
124
Voted
AINA
2005
IEEE
15 years 9 months ago
mPATH: An Interactive Visualization Framework for Behavior History
This paper presents an interactive analysis and visualization framework for behavior histories, called mPATH framework. In ubiquitous computing environment, it is possible to infe...
Masaki Ito, Jin Nakazawa, Hideyuki Tokuda
NCA
2005
IEEE
15 years 9 months ago
Reducing the Communication Cost via Chain Pattern Scheduling
This paper deals with general nested loops and proposes a novel scheduling methodology for reducing the communication cost of parallel programs. General loops contain complex loop...
Florina M. Ciorba, Theodore Andronikos, Ioannis Dr...