Sciweavers

9290 search results - page 1621 / 1858
» The Predictability of Data Values
Sort
View
ICDCS
2008
IEEE
15 years 11 months ago
Analysis of Maximum Executable Length for Detecting Text-Based Malware
The possibility of using purely text stream (keyboardenterable) as carrier of malware is under-researched and often underestimated. A text attack can happen at multiple levels, fr...
P. Kumar Manna, Sanjay Ranka, Shigang Chen
INFOCOM
2008
IEEE
15 years 10 months ago
Detecting Anomalies Using End-to-End Path Measurements
—In this paper, we propose new “low-overhead” network monitoring techniques to detect violations of path-level QoS guarantees like end-to-end delay, loss, etc. Unlike existin...
K. V. M. Naidu, Debmalya Panigrahi, Rajeev Rastogi
IROS
2008
IEEE
100views Robotics» more  IROS 2008»
15 years 10 months ago
Using structures to synchronize cameras of robots swarms
— The synchronization of image sequences acquired by robots swarms is an essential task for localization operations. We address this problem by considering the swarms as dynamic ...
Richard Chang, Sio-Hoi Ieng, Ryad Benosman
IV
2008
IEEE
119views Visualization» more  IV 2008»
15 years 10 months ago
CAT: A Hierarchical Image Browser Using a Rectangle Packing Technique
The recent revolution of digital camera technology has resulted in much larger collections of images. Image browsing techniques thus become increasingly important for overview and...
Ai Gomi, Reiko Miyazaki, Takayuki Itoh, Jia Li
MMM
2008
Springer
117views Multimedia» more  MMM 2008»
15 years 10 months ago
Distribution-Based Similarity for Multi-represented Multimedia Objects
In modern multimedia databases, objects can be represented by a large variety of feature representations. In order to employ all available information in a best possible way, a joi...
Hans-Peter Kriegel, Peter Kunath, Alexey Pryakhin,...
« Prev « First page 1621 / 1858 Last » Next »