Sciweavers

1591 search results - page 305 / 319
» Associating network flows with user and application informat...
Sort
View
WWW
2006
ACM
14 years 7 months ago
DoNet: a semantic domotic framework
In the very near future complete households will be entirely networked as a de facto standard. In this poster we briefly describe our work in the area of domotics, where personali...
Malcolm Attard, Matthew Montebello
CEC
2008
IEEE
14 years 1 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
ISMAR
2008
IEEE
14 years 1 months ago
In-place Augmented Reality
In this paper we present a new vision-based approach for transmitting virtual models for Augmented Reality (AR). A two dimensional representation of the virtual models is embedded...
Nate Hagbi, Oriel Bergig, Jihad El-Sana, Klara Ked...
CIVR
2004
Springer
194views Image Analysis» more  CIVR 2004»
14 years 4 days ago
A Test-Bed for Region-Based Image Retrieval Using Multiple Segmentation Algorithms and the MPEG-7 eXperimentation Model: The Sch
The aim of the SCHEMA Network of Excellence is to bring together a critical mass of universities, research centers, industrial partners and end users, in order to design a referenc...
Vasileios Mezaris, Haralambos Doulaverakis, Raul M...
ATC
2009
Springer
13 years 10 months ago
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...