Sciweavers

12568 search results - page 2234 / 2514
» Selective user interaction
Sort
View
IJDE
2006
95views more  IJDE 2006»
15 years 4 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
ENGL
2007
73views more  ENGL 2007»
15 years 4 months ago
Cognitive Design Features on Traffic Signs
—The success of effective communication of traffic sign messages to road users may not only relate to the user characteristics but also the signs themselves. The purpose of this ...
Annie W. Y. Ng, Alan H. S. Chan
JODL
2006
131views more  JODL 2006»
15 years 4 months ago
Keyframe-based video summarization using Delaunay clustering
Recent advances in technology have made tremendous amount of multimedia information available to the general population. An efficient way of dealing with this new development is t...
Padmavathi Mundur, Yong Rao, Yelena Yesha
SIGMOD
2008
ACM
113views Database» more  SIGMOD 2008»
15 years 4 months ago
Supporting OLAP operations over imperfectly integrated taxonomies
OLAP is an important tool in decision support. With the help of domain knowledge, such as hierarchies of attribute values, OLAP helps the user observe the effects of various decis...
Yan Qi 0002, K. Selçuk Candan, Jun'ichi Tat...
IPM
2007
156views more  IPM 2007»
15 years 4 months ago
p2pDating: Real life inspired semantic overlay networks for Web search
We consider a network of autonomous peers forming a logically global but physically distributed search engine, where every peer has its own local collection generated by independe...
Josiane Xavier Parreira, Sebastian Michel, Gerhard...
« Prev « First page 2234 / 2514 Last » Next »