Sciweavers

25316 search results - page 5026 / 5064
» Computational sensor networks
Sort
View
CAISE
2006
Springer
14 years 17 days ago
A Personalized and Context-Aware Adaptation Process for Web-Based Groupware Systems
The evolution of mobile technologies, like web-enable cellphones, PDAs and wireless networks, makes it now possible to use these technologies for collaborative work through web-bas...
Manuele Kirsch-Pinheiro, Marlène Villanova-...
CCS
2006
ACM
14 years 17 days ago
Design space and analysis of worm defense strategies
We give the first systematic investigation of the design space of worm defense system strategies. We accomplish this by g a taxonomy of defense strategies by abstracting away impl...
David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn...
ACNS
2006
Springer
87views Cryptology» more  ACNS 2006»
14 years 16 days ago
Effect of Malicious Synchronization
Abstract. We study the impact of malicious synchronization on computer systems that serve customers periodically. Systems supporting automatic periodic updates are common in web se...
Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng So...
ECTEL
2006
Springer
14 years 15 days ago
Peer-to-peer Face-to-face Collaboration
In this paper, we present a proof of concept application of a technique that is designed explicitly for face to face collaboration software architectures. The objective is to minim...
Delfina Malandrino, Ilaria Manno
AC
2003
Springer
14 years 14 days ago
Influence of Location over Several Classifiers in 2D and 3D Face Verification
In this paper two methods for human face recognition and the influence of location mistakes are shown. First one, Principal Components Analysis (PCA), has been one of the most appl...
Susana Mata, Cristina Conde, Araceli Sánche...
« Prev « First page 5026 / 5064 Last » Next »