Sciweavers

390 search results - page 56 / 78
» Performance Analysis of the Active Object Pattern in Middlew...
Sort
View
144
Voted
RAID
2010
Springer
15 years 1 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
120
Voted
CVPR
2010
IEEE
15 years 8 months ago
An Online Approach: Learning-Semantic-Scene-by-Tracking and Tracking-by-Learning-Semantic-Scene
Learning the knowledge of scene structure and tracking a large number of targets are both active topics of computer vision in recent years, which plays a crucial role in surveilla...
Xuan Song, Xiaowei Shao, Huijing Zhao, Jinshi Cui,...
132
Voted
CONCURRENCY
2002
89views more  CONCURRENCY 2002»
15 years 3 months ago
MyPYTHIA: a recommendation portal for scientific software and services
In this paper, we outline the design of a recommendation system (MyPYTHIA) implemented as a web portal. MyPYTHIA's design objectives include evaluating the quality and perfor...
Elias N. Houstis, Ann Christine Catlin, Nitesh Dha...
169
Voted
IMC
2009
ACM
15 years 10 months ago
Characterizing user behavior in online social networks
Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, richer studies of social interactions, and improved ...
Fabrício Benevenuto, Tiago Rodrigues, Meeyo...
124
Voted
CONEXT
2008
ACM
15 years 5 months ago
Is there life in Second Life?
Abstract: Social virtual worlds such as Second Life are digital representations of the real world where human-controlled avatars evolve and interact through social activities. Unde...
Matteo Varvello, Fabio Picconi, Christophe Diot, E...