Sciweavers

1737 search results - page 182 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
IPMI
2003
Springer
16 years 5 months ago
Meshfree Representation and Computation: Applications to Cardiac Motion Analysis
Abstract. For medical image analysis issues where the domain mappings between images involve large geometrical shape changes, such as the cases of nonrigid motion recovery and inte...
Huafeng Liu, Pengcheng Shi
NSDI
2004
15 years 6 months ago
Measurement and Analysis of Spyware in a University Environment
Over the past few years, a relatively new computing phenomenon has gained momentum: the spread of "spyware." Though most people are aware of spyware, the research commun...
Stefan Saroiu, Steven D. Gribble, Henry M. Levy
VISUALIZATION
2005
IEEE
15 years 10 months ago
Eyegaze Analysis of Displays With Combined 2D and 3D Views
Displays combining both 2D and 3D views have been shown to support higher performance on certain visualization tasks. However, it is not clear how best to arrange a combination of...
Melanie Tory, M. Stella Atkins, Arthur E. Kirkpatr...
COMPSEC
2006
97views more  COMPSEC 2006»
15 years 5 months ago
Towards a location-based mandatory access control model
With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be necessary for access control. The use of location inf...
Indrakshi Ray, Mahendra Kumar
141
Voted
CANDT
2009
15 years 9 months ago
An analysis of the social structure of remix culture
We present findings from our study of a music sharing and remixing community in an effort to quantify and understand the structural characteristics of commons-based peer productio...
Giorgos Cheliotis, Jude Yew