Sciweavers

2656 search results - page 437 / 532
» Design and analysis of algorithms reconsidered
Sort
View
NSPW
2004
ACM
15 years 9 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
UIST
2004
ACM
15 years 9 months ago
Visual tracking of bare fingers for interactive surfaces
Visual tracking of bare fingers allows more direct manipulation of digital objects, multiple simultaneous users interacting with their two hands, and permits the interaction on l...
Julien Letessier, François Bérard
BIOADIT
2004
Springer
15 years 9 months ago
Explaining Low-Level Brightness-Contrast Illusions Using Disinhibition
Conventional Difference of Gaussian (DOG) filter is usually used to model the early stage of visual processing. However, convolution operation used with DOG does not explicitly a...
Yingwei Yu, Takashi Yamauchi, Yoonsuck Choe
IMC
2003
ACM
15 years 9 months ago
Virtual landmarks for the internet
Internet coordinate schemes have been proposed as a method for estimating minimum round trip time between hosts without direct measurement. In such a scheme, each host is assigned...
Liying Tang, Mark Crovella
ISPD
2003
ACM
89views Hardware» more  ISPD 2003»
15 years 9 months ago
Local unidirectional bias for smooth cutsize-delay tradeoff in performance-driven bipartitioning
Traditional multilevel partitioning approaches have shown good performance with respect to cutsize, but offer no guarantees with respect to system performance. Timing-driven part...
Andrew B. Kahng, Xu Xu