Sciweavers

9162 search results - page 1678 / 1833
» System and User Data Complexity
Sort
View
82
Voted
ACSAC
2006
IEEE
15 years 4 months ago
Practical Attack Graph Generation for Network Defense
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patc...
Kyle Ingols, Richard Lippmann, Keith Piwowarski
HICSS
2006
IEEE
96views Biometrics» more  HICSS 2006»
15 years 4 months ago
When Online Reviews Meet Hyperdifferentiation: A Study of Craft Beer Industry
We analyze how online reviews can be used to evaluate product differentiation strategy based on the theories of hyperdifferentiation and resonance marketing. Hyperdifferentiation ...
Eric K. Clemons, Guodong Gao, Lorin M. Hitt
INFOCOM
2006
IEEE
15 years 4 months ago
Trust Evaluation in Anarchy: A Case Study on Autonomous Networks
— With the explosive growth of network techniques, in particular wireless communications, the traditional centralized, fixed networks can no longer satisfy the enormous demands ...
Tao Jiang, John S. Baras
IROS
2006
IEEE
164views Robotics» more  IROS 2006»
15 years 4 months ago
SLAM using Visual Scan-Matching with Distinguishable 3D Points
— Scan-matching based on data from a laser scanner is frequently used for mapping and localization. This paper presents an scan-matching approach based instead on visual informat...
Federico Bertolli, Patric Jensfelt, Henrik I. Chri...
73
Voted
DATE
2005
IEEE
180views Hardware» more  DATE 2005»
15 years 3 months ago
A Coprocessor for Accelerating Visual Information Processing
Visual information processing will play an increasingly important role in future electronics systems. In many applications, e.g. video surveillance cameras, data throughput of mic...
Walter Stechele, L. Alvado Cárcel, Stephan ...
« Prev « First page 1678 / 1833 Last » Next »