Sciweavers

3072 search results - page 440 / 615
» Shape analysis algorithm based on information theory
Sort
View
DRM
2008
Springer
14 years 12 months ago
A decision theoretic framework for analyzing binary hash-based content identification systems
Content identification has many applications, ranging from preventing illegal sharing of copyrighted content on video sharing websites, to automatic identification and tagging of ...
Avinash L. Varna, Ashwin Swaminathan, Min Wu
93
Voted
VIROLOGY
2008
84views more  VIROLOGY 2008»
14 years 10 months ago
Formal affordance-based models of computer virus reproduction
We present a novel classification of computer viruses using a formalised notion of reproductive models based on Gibson's theory of affordances. A computer virus reproduction ...
Matt Webster, Grant Malcolm
DATE
2007
IEEE
145views Hardware» more  DATE 2007»
15 years 4 months ago
Using an innovative SoC-level FMEA methodology to design in compliance with IEC61508
This paper proposes an innovative methodology to perform and validate a Failure Mode and Effects Analysis (FMEA) at System-on-Chip (SoC) level. This is done in compliance with the...
Riccardo Mariani, Gabriele Boschi, Federico Colucc...
HICSS
2007
IEEE
164views Biometrics» more  HICSS 2007»
15 years 4 months ago
Supporting Knowledge Transfer through Decomposable Reasoning Artifacts
Technology to support knowledge transfer and cooperative inquiry must offer its users the ability to effectively interpret knowledge structures produced by collaborators. Communic...
William Pike, Richard May, Alan Turner
ICMI
2003
Springer
96views Biometrics» more  ICMI 2003»
15 years 3 months ago
Learning and reasoning about interruption
We present methods for inferring the cost of interrupting users based on multiple streams of events including information generated by interactions with computing devices, visual ...
Eric Horvitz, Johnson Apacible