Sciweavers

2555 search results - page 200 / 511
» Quantifiers and Working Memory
Sort
View
177
Voted
FGR
2008
IEEE
229views Biometrics» more  FGR 2008»
15 years 10 months ago
Activity detection in conversational sign language video for mobile telecommunication
The goal of the MobileASL project is to increase accessibility by making the mobile telecommunications network available to the signing Deaf community. Video cell phones enable De...
Neva Cherniavsky, Richard E. Ladner, Eve A. Riskin
136
Voted
ICPPW
2008
IEEE
15 years 10 months ago
Replay-Based Synchronization of Timestamps in Event Traces of Massively Parallel Applications
Event traces are helpful in understanding the performance behavior of message-passing applications since they allow in-depth analyses of communication and synchronization patterns...
Daniel Becker, John C. Linford, Rolf Rabenseifner,...
125
Voted
NDSS
2008
IEEE
15 years 10 months ago
Taming the Devil: Techniques for Evaluating Anonymized Network Data
Anonymization plays a key role in enabling the public release of network datasets, and yet there are few, if any, techniques for evaluating the efficacy of network data anonymiza...
Scott E. Coull, Charles V. Wright, Angelos D. Kero...
130
Voted
BROADNETS
2007
IEEE
15 years 10 months ago
Modeling and analysis of worm interactions (war of the worms)
—“War of the worms” is a war between opposing computer worms, creating complex worm interactions as well as detrimental impact on infrastructure. For example, in September 20...
Sapon Tanachaiwiwat, Ahmed Helmy
DSN
2007
IEEE
15 years 10 months ago
Greedy Receivers in IEEE 802.11 Hotspots
As wireless hotspot business becomes a tremendous financial success, users of these networks have increasing motives to misbehave in order to obtain more bandwidth at the expense...
Mi Kyung Han, Brian Overstreet, Lili Qiu