Sciweavers

524 search results - page 66 / 105
» Why phishing works
Sort
View
IPPS
2006
IEEE
15 years 8 months ago
Towards MPI progression layer elimination with TCP and SCTP
MPI middleware glues together the components necessary for execution. Almost all implementations have a communication component also called a message progression layer that progre...
Brad Penoff, Alan Wagner
3DIM
2005
IEEE
15 years 7 months ago
Determining Characteristic Views of a 3D Object by Visual Hulls and Hausdorff Distance
Nowadays, with the exponential growing of 3D object representations in private databases or on the web, it is all the more required to match these objects from some views. To impr...
Adrien Theetten, Jean-Philippe Vandeborre, Mohamed...
AVSS
2005
IEEE
15 years 7 months ago
Rank-based multisensory fusion in multitarget video tracking
An attractive approach to improve tracking performance for visual surveillance is to use information from multiple visual sensory cues such as position, color, shape, etc. Previou...
Damian M. Lyons, D. Frank Hsu
HICSS
2005
IEEE
171views Biometrics» more  HICSS 2005»
15 years 7 months ago
An Architecture and Business Model for Making Software Agents Commercially Viable
While several research projects have been proposed to use software agents to deal with information overload, their results are not applicable in the existing Web infrastructure ma...
Qusay H. Mahmoud, Leslie Yu
ICDM
2005
IEEE
125views Data Mining» more  ICDM 2005»
15 years 7 months ago
A Thorough Experimental Study of Datasets for Frequent Itemsets
The discovery of frequent patterns is a famous problem in data mining. While plenty of algorithms have been proposed during the last decade, only a few contributions have tried to...
Frédéric Flouvat, Fabien De Marchi, ...