Sciweavers

8329 search results - page 1654 / 1666
» An ATM-based Distributed High Performance Computing System
Sort
View
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 7 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
14 years 2 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...
LCN
2006
IEEE
14 years 1 months ago
On Access Point Selection in IEEE 802.11 Wireless Local Area Networks
In wireless local area networks often a station can potentially associate with more than one access point. Therefore, a relevant question is which access point to select “best...
Murad Abusubaih, James Gross, Sven Wiethölter...
SIGGRAPH
2003
ACM
14 years 24 days ago
Perceptual evaluation of tone mapping operators
A number of successful tone mapping operators for contrast compression have been proposed due to the need to visualize high dynamic range (HDR) images on low dynamic range devices...
Frédéric Drago, William L. Martens, ...
KDD
2009
ACM
257views Data Mining» more  KDD 2009»
14 years 2 months ago
Argo: intelligent advertising by mining a user's interest from his photo collections
In this paper, we introduce a system named Argo which provides intelligent advertising made possible from users’ photo collections. Based on the intuition that user-generated ph...
Xin-Jing Wang, Mo Yu, Lei Zhang, Rui Cai, Wei-Ying...
« Prev « First page 1654 / 1666 Last » Next »