Sciweavers

7811 search results - page 1257 / 1563
» computing 2004
Sort
View
NPAR
2004
ACM
15 years 10 months ago
Example-based composite sketching of human portraits
Creating a portrait in the style of a particular artistic tradition or a particular artist is a difficult problem. Elusive to codify algorithmically, the nebulous qualities which...
Hong Chen, Ziqiang Liu, Chuck Rose, Yingqing Xu, H...
NSPW
2004
ACM
15 years 10 months ago
The user non-acceptance paradigm: INFOSEC's dirty little secret
(by Victor Raskin) This panel will address users’ perceptions and misperceptions of the risk/benefit and benefit/nuisance ratios associated with information security products, an...
Steven J. Greenwald, Kenneth G. Olthoff, Victor Ra...
NSPW
2004
ACM
15 years 10 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
PADS
2004
ACM
15 years 10 months ago
Optimizing Parallel Execution of Detailed Wireless Network Simulation
With Parallel and Discrete Event Simulation (PDES) techniques, the runtime performance of detailed wireless network simulation can be improved significantly without compromising ...
Zhengrong Ji, Junlan Zhou, Mineo Takai, Jay Martin...
PEWASUN
2004
ACM
15 years 10 months ago
Multipath routing and multiple description coding in ad-hoc networks: a simulation study
The nature of ad hoc networks makes it a challenge to offer connections with an assured quality. In order to improve the performance of the network, multipath routing in combinati...
Irene Fernández Díaz, Dick H. J. Epe...
« Prev « First page 1257 / 1563 Last » Next »