Sciweavers

2275 search results - page 405 / 455
» A Deployment System for Pervasive Computing
Sort
View
136
Voted
WAPCV
2007
Springer
15 years 10 months ago
A Proto-object Based Visual Attention Model
One of the first steps of any visual system is that of locating suitable interest points, ‘salient regions’, in the scene, to detect events, and eventually to direct gaze towa...
Francesco Orabona, Giorgio Metta, Giulio Sandini
129
Voted
IPCCC
2006
IEEE
15 years 9 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
142
Voted
GD
2008
Springer
15 years 4 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
154
Voted
CCR
2008
109views more  CCR 2008»
15 years 3 months ago
An independent H-TCP implementation under FreeBSD 7.0: description and observed behaviour
A key requirement for IETF recognition of new TCP algorithms is having an independent, interoperable implementation. This paper describes our BSD-licensed implementation of H-TCP ...
Grenville J. Armitage, Lawrence Stewart, Michael W...
134
Voted
GI
2009
Springer
15 years 1 months ago
Combined Optimization of Aircraft Maneuvers and RF Measurements for Passive Air-Air Ranging
: When a tactical aircraft sets out on a mission in dense airborne and surface RF (radio frequency) emitter environment, the pilot desires to minimize the use of the onboard fire c...
Ronald Matthew Yannone, Melvin Carroll