Sciweavers

1929 search results - page 253 / 386
» An Approach to Limit the Wynot Problem
Sort
View
ACSAC
2002
IEEE
14 years 1 months ago
Malicious Code Detection for Open Firmware
Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating syst...
Frank Adelstein, Matthew Stillerman, Dexter Kozen
EH
2002
IEEE
139views Hardware» more  EH 2002»
14 years 1 months ago
Evolving Cellular Automata to Model Fluid Flow in Porous Media
Fluid flow in porous media is a dynamic process that is traditionally modeled using PDE (Partial Differential Equations). In this approach, physical properties related to fluid fl...
Tina Yu, Seong Lee
ICDCSW
2002
IEEE
14 years 1 months ago
A Scalable Technique for VCR-Like Interactions in Video-on-Demand Applications
In video-on-demand (VOD) applications, it is desirable to provide the user with the video-cassette-recorder-like (VCR) capabilities such as fast-forwarding a video or jumping to a...
Mounir A. Tantaoui, Kien A. Hua, Simon Sheu
GI
2001
Springer
14 years 1 months ago
Supporting Collaborative Authoring of Web Content by Customizable Resource Repositories
The process of collaborative authoring of Web content may be supported by resource repositories which provide storage facilities as well as certain value-added services. However, ...
Jernej Kovse, Theo Härder, Norbert Ritter, Ha...
ICMCS
2000
IEEE
142views Multimedia» more  ICMCS 2000»
14 years 1 months ago
Incorporate Discriminant Analysis with EM Algorithm in Image Retrieval
One of the difficulties of Content-Based Image Retrieval (CBIR) is the gap between high-level concepts and low-level image features, e.g., color and texture. Relevance feedback wa...
Qi Tian, Ying Wu, Thomas S. Huang