Sciweavers

2379 search results - page 390 / 476
» Computer Science in the Information Age
Sort
View
ISI
2008
Springer
15 years 4 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham

Publication
1500views
17 years 5 months ago
Robust Centerline Extraction Framework Using Level Sets
In this paper, we present a novel framework for computing centerlines for both 2D and 3D shape analysis. The framework works as follows: an object centerline point is selected aut...
M. Sabry Hassouna, Aly A. Farag
COMGEO
2006
ACM
15 years 4 months ago
Octrees with near optimal cost for ray-shooting
Predicting and optimizing the performance of ray shooting is a very important problem in computer graphics due to the severe computational demands of ray tracing and other applica...
Hervé Brönnimann, Marc Glisse
GRID
2006
Springer
15 years 4 months ago
Labs of the World, Unite!!!
: eScience is rapidly changing the way we do research. As a result, many research labs now need non-trivial computational power. Grid and voluntary computing are well-established s...
Walfredo Cirne, Francisco Vilar Brasileiro, Nazare...
CHI
2007
ACM
16 years 4 months ago
Noticing notice: a large-scale experiment on the timing of software license agreements
Spyware is an increasing problem. Interestingly, many programs carrying spyware honestly disclose the activities of the software, but users install the software anyway. We report ...
Nathaniel Good, Jens Grossklags, Deirdre K. Mullig...