Sciweavers

1663 search results - page 22 / 333
» Computer Security in the Real World
Sort
View
ASSETS
2008
ACM
13 years 9 months ago
Speech technology in real world environment: early results from a long term study
Existing knowledge on how people use speech-based technologies in realistic settings is limited. We are conducting a longitudinal field study, spanning six months, to investigate ...
Jinjuan Feng, Shaojian Zhu, Ruimin Hu, Andrew Sear...
ACCV
2010
Springer
13 years 2 months ago
A Method for Text Localization and Recognition in Real-World Images
A general method for text localization and recognition in real-world images is presented. The proposed method is novel, as it (i) departs from a strict feed-forward pipeline and re...
Lukas Neumann, Jiri Matas
AAAI
2006
13 years 9 months ago
Decision Making in Uncertain Real-World Domains Using DT-Golog
DTGolog, a decision-theoretic agent programming language based on the situation calculus, was proposed to ease some of the computational difficulties associated with Markov Decisi...
Mikhail Soutchanski, Huy Pham, John Mylopoulos
ACSAC
2005
IEEE
14 years 1 months ago
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers
An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are gr...
Weidong Cui, Randy H. Katz, Wai-tian Tan
ICWS
2009
IEEE
14 years 4 months ago
Discovery and On-demand Provisioning of Real-World Web Services
The increasing usage of smart embedded devices is blurring the line between the virtual and real worlds. This creates new opportunities for applications to better integrate the re...
Dominique Guinard, Vlad Trifa, Patrik Spiess, Bett...