Sciweavers

420 search results - page 69 / 84
» An investigation into the use of field methods in the design...
Sort
View
ACSC
2006
IEEE
14 years 1 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi
EJIS
2007
140views more  EJIS 2007»
13 years 7 months ago
External Web content and its influence on organizational performance
Research into the Internet has experienced a tremendous growth within the field of information systems. In this sense, the recent literature focuses on more complex research topic...
Ángel Meroño-Cerdan, Pedro Soto-Acos...
TCSV
2008
143views more  TCSV 2008»
13 years 7 months ago
High-Speed Action Recognition and Localization in Compressed Domain Videos
We present a compressed domain scheme that is able to recognize and localize actions in real-time1 . The recognition problem is posed as performing an action video query on a test ...
Chuohao Yeo, Parvez Ahammad, Kannan Ramchandran, S...
JCDL
2009
ACM
133views Education» more  JCDL 2009»
14 years 2 months ago
Cost and benefit analysis of mediated enterprise search
The utility of an enterprise search system is determined by three key players: the information retrieval (IR) system (the search engine), the enterprise users, and the service pro...
Mingfang Wu, James A. Thom, Andrew Turpin, Ross Wi...
FTDCS
2004
IEEE
13 years 11 months ago
Towards Supporting Fine-Grained Access Control for Grid Resources
The heterogeneous nature and independent administration of geographically dispersed resources in Grid, demand the need for access control using fine-grained policies. In this pape...
Elisa Bertino, Pietro Mazzoleni, Bruno Crispo, Swa...