Sciweavers

2081 search results - page 373 / 417
» codes 2006
Sort
View
64
Voted
ISI
2006
Springer
14 years 10 months ago
A First Look at Domestic and International Global Terrorism Events, 1970-1997
While the study of terrorism has expanded dramatically since the 1970s, most analyses are limited to qualitative case studies or quantitative analyses of international incidents on...
Laura Dugan, Gary LaFree, Heather Fogg
93
Voted
ISM
2006
IEEE
173views Multimedia» more  ISM 2006»
14 years 10 months ago
Automatic Capture of Significant Points in a Computer Based Presentation
We describe an automatic classroom capture system that detects and records significant (stable) points in lectures by sampling and analyzing a sequence of screen capture frames fr...
Paul E. Dickson, W. Richards Adrion, Allen R. Hans...
74
Voted
ENVSOFT
2007
126views more  ENVSOFT 2007»
14 years 10 months ago
Uncertainty and precaution in environmental management: Insights from the UPEM conference
Communication across the science-policy interface is complicated by uncertainty and ignorance associated with predictions on which to base policies. The international symposium â€...
Jeroen P. van der Sluijs
MICRO
2006
IEEE
113views Hardware» more  MICRO 2006»
14 years 10 months ago
Exploiting Fine-Grained Data Parallelism with Chip Multiprocessors and Fast Barriers
We examine the ability of CMPs, due to their lower onchip communication latencies, to exploit data parallelism at inner-loop granularities similar to that commonly targeted by vec...
Jack Sampson, Rubén González, Jean-F...
104
Voted
PE
2006
Springer
114views Optimization» more  PE 2006»
14 years 10 months ago
On the performance of Internet worm scanning strategies
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become one of the major threats to the security of the Internet. In order to defend agai...
Cliff Changchun Zou, Donald F. Towsley, Weibo Gong