Sciweavers

448 search results - page 78 / 90
» i* with Aspects: Evaluating Understandability
Sort
View
ACSAC
2010
IEEE
14 years 7 months ago
Conficker and beyond: a large-scale empirical study
Conficker [26] is the most recent widespread, well-known worm/bot. According to several reports [16, 28], it has infected about 7 million to 15 million hosts and the victims are s...
Seungwon Shin, Guofei Gu
MM
2006
ACM
180views Multimedia» more  MM 2006»
15 years 3 months ago
Fast tracking of near-duplicate keyframes in broadcast domain with transitivity propagation
The identification of near-duplicate keyframe (NDK) pairs is a useful task for a variety of applications such as news story threading and content-based video search. In this pape...
Chong-Wah Ngo, Wanlei Zhao, Yu-Gang Jiang
MUM
2005
ACM
164views Multimedia» more  MUM 2005»
15 years 3 months ago
PhoneGuide: museum guidance supported by on-device object recognition on mobile phones
We present PhoneGuide – an enhanced museum guidance approach that uses camera-equipped mobile phones and on-device object recognition. Our main technical achievement is a simple...
Paul Föckler, Thomas Zeidler, Benjamin Bromba...
SIGMETRICS
2003
ACM
129views Hardware» more  SIGMETRICS 2003»
15 years 2 months ago
Run-time modeling and estimation of operating system power consumption
The increasing constraints on power consumption in many computing systems point to the need for power modeling and estimation for all components of a system. The Operating System ...
Tao Li, Lizy Kurian John
SIGMETRICS
1997
ACM
15 years 1 months ago
File System Aging - Increasing the Relevance of File System Benchmarks
Benchmarks are important because they provide a means for users and researchers to characterize how their workloads will perform on different systems and different system architec...
Keith A. Smith, Margo I. Seltzer