Sciweavers

1156 search results - page 154 / 232
» The PENG System: Practice and Experience
Sort
View
RAID
2007
Springer
15 years 5 months ago
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
Xuxian Jiang, Xinyuan Wang
GLVLSI
2010
IEEE
164views VLSI» more  GLVLSI 2010»
15 years 4 months ago
Performance and energy trade-offs analysis of L2 on-chip cache architectures for embedded MPSoCs
On-chip memory organization is one of the most important aspects that can influence the overall system behavior in multiprocessor systems. Following the trend set by high-perform...
Mohamed M. Sabry, Martino Ruggiero, Pablo Garcia D...
CVPR
2005
IEEE
16 years 1 months ago
Computer Vision for Music Identification
We describe how certain tasks in the audio domain can be effectively addressed using computer vision approaches. This paper focuses on the problem of music identification, where t...
Yan Ke, Derek Hoiem, Rahul Sukthankar
MICCAI
2008
Springer
16 years 26 days ago
Estimation of Ground-Glass Opacity Measurement in CT Lung Images
We propose to measure quantitatively the opacity property of each pixel in a ground-glass opacity tumor from CT images. Our method results in an opacity map in which each pixel tak...
Yuanjie Zheng, Chandra Kambhamettu, Thomas Bauer...
WWW
2004
ACM
16 years 11 days ago
E-learning personalization based on itineraries and long-term navigational behavior
In this paper we describe a practical framework for studying the navigational behavior of the users of an e-learning environment integrated in a virtual campus. The students navig...
Enric Mor, Julià Minguillón