Sciweavers

5722 search results - page 994 / 1145
» Security Function Interactions
Sort
View
122
Voted
ITS
2000
Springer
93views Multimedia» more  ITS 2000»
15 years 7 months ago
Training Teams with Collaborative Agents
Training teams is an activity that is expensive, time-consuming, hazardous in some cases, and can be limited by availability of equipment and personnel. In team training, the focus...
Michael S. Miller, Jianwen Yin, Richard A. Volz, T...
MICCAI
2000
Springer
15 years 7 months ago
Retrospective Correction of MR Intensity Inhomogeneity by Information Minimization
In this paper, the problem of retrospective correction of intensity inhomogeneity in magnetic resonance (MR) images is addressed. A novel model-based correction method is proposed,...
Bostjan Likar, Max A. Viergever, Franjo Pernus
VISSYM
2007
15 years 5 months ago
Subdivision Volume Splatting
Volumetric Subdivision (VS) is a powerful paradigm that enables volumetric sculpting and realistic volume deformations that give rise to the concept of "virtual clay". I...
Kevin T. McDonnell, Neophytos Neophytou, Klaus Mue...
159
Voted
MOBISYS
2008
ACM
15 years 5 months ago
Chameleon: a capability adaptation system for interface virtualization
As computing capabilities of embedded devices increase, services such as Internet and multimedia are comportably supported by such devices. Users may demand for migrating services...
Sang-Bum Suh, Xiang Song, Jatin Kumar, Dushmanta M...
USS
2008
15 years 5 months ago
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads
We present an automated, scalable, method for crafting dynamic responses to real-time network requests. Specifically, we provide a flexible technique based on natural language pro...
Sam Small, Joshua Mason, Fabian Monrose, Niels Pro...