Sciweavers

3747 search results - page 621 / 750
» Active Operations on Collections
Sort
View
MOBISYS
2011
ACM
12 years 12 months ago
Opportunistic alignment of advertisement delivery with cellular basestation overloads
This paper is motivated by two observations: (1) cellular network operators are actively exploring advertisement delivery as a new means of revenue generation, and (2) cellular ba...
Ravi Kokku, Rajesh Mahindra, Sampath Rangarajan, H...
ICCV
2011
IEEE
12 years 9 months ago
Probabilistic Group-Level Motion Analysis and Scenario Recognition
This paper addresses the challenge of recognizing behavior of groups of individuals in unconstraint surveillance environments. As opposed to approaches that rely on agglomerative ...
Ming-Ching Chang, Nils Krahnstoever, Weina Ge
CCS
2011
ACM
12 years 9 months ago
The power of procrastination: detection and mitigation of execution-stalling malicious code
Malware continues to remain one of the most important security problems on the Internet today. Whenever an anti-malware solution becomes popular, malware authors typically react p...
Clemens Kolbitsch, Engin Kirda, Christopher Kruege...
ESORICS
2011
Springer
12 years 8 months ago
Remote Timing Attacks Are Still Practical
For over two decades, timing attacks have been an active area of research within applied cryptography. These attacks exploit cryptosystem or protocol implementations that do not ru...
Billy Bob Brumley, Nicola Tuveri
VIS
2007
IEEE
86views Visualization» more  VIS 2007»
14 years 10 months ago
Illustrative Deformation for Data Exploration
Abstract--Much of the visualization research has focused on improving the rendering quality and speed, and enhancing the perceptibility of features in the data. Recently, significa...
Carlos Correa, Deborah Silver, Min Chen