Sciweavers

4511 search results - page 742 / 903
» Observation Based System Security
Sort
View
CVPR
2009
IEEE
15 years 7 months ago
High-quality curvelet-based motion deblurring from an image pair
One promising approach to remove motion deblurring is to recover one clear image using an image pair. Existing dual-image methods require an accurate image alignment between the i...
Jian-Feng Cai, Hui Ji, Chaoqiang Liu, Zuowei Shen
140
Voted
ESOP
2006
Springer
15 years 7 months ago
A Typed Assembly Language for Confidentiality
Language-based information-flow analysis is promising in protecting data confidentiality. Although much work has been carried out in this area, relatively little has been done for ...
Dachuan Yu, Nayeem Islam
132
Voted
GECCO
2006
Springer
179views Optimization» more  GECCO 2006»
15 years 7 months ago
Evolving cooperative behavior in a power market
This paper presents an evolutionary algorithm to develop cooperative strategies for power buyers in a deregulated electrical power market. Cooperative strategies are evolved throu...
Dipti Srinivasan, Dakun Woo, Lily Rachmawati, Kong...
ICMI
2000
Springer
171views Biometrics» more  ICMI 2000»
15 years 7 months ago
Gaze and Speech in Attentive User Interfaces
The trend toward pervasive computing necessitates finding and implementing appropriate ways for users to interact with devices. We believe the future of interaction with pervasive ...
Paul P. Maglio, Teenie Matlock, Christopher S. Cam...
LISA
2007
15 years 5 months ago
NetADHICT: A Tool for Understanding Network Traffic
Computer and network administrators are often confused or uncertain about the behavior of their networks. Traditional analysis using IP ports, addresses, and protocols are insuffi...
Hajime Inoue, Dana Jansens, Abdulrahman Hijazi, An...