Sciweavers

1663 search results - page 126 / 333
» Computer Security in the Real World
Sort
View
169
Voted
CG
1999
Springer
15 years 3 months ago
A distributed device diagnostics system utilizing augmented reality and 3D audio
Augmented Reality brings technology developed for virtual environments into the real world. This approach can be used to provide instructions for routine maintenance and error diag...
Reinhold Behringer, Steven Chen, Venkataraman Sund...
145
Voted
CEAS
2006
Springer
15 years 7 months ago
Teaching Spam and Spyware at the University of C@1g4ry
The University of Calgary is attacking the problems of spam and spyware from the angle of education. "Spam and Spyware" is a computer science course offered at both the ...
John Aycock
137
Voted
MSWIM
2005
ACM
15 years 9 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
141
Voted
CG
2004
Springer
15 years 3 months ago
ANTS--Augmented Environments
When interacting with natural or urban environments there are many situations where the ability to access data in real time becomes relevant. Augmented Reality (AR) technologies a...
Teresa Romão, Nuno Correia, A. Eduardo Dias...
134
Voted
ICPR
2006
IEEE
16 years 4 months ago
Hybrid Kernel Machine Ensemble for Imbalanced Data Sets
A two-class imbalanced data problem (IDP) emerges when the data from majority class are compactly clustered and the data from minority class are scattered. Though a discriminative...
Kap Luk Chan, Peng Li, Wen Fang