Sciweavers

8177 search results - page 1598 / 1636
» Detecting System Emulators
Sort
View
ESORICS
2004
Springer
14 years 3 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
ICMI
2004
Springer
129views Biometrics» more  ICMI 2004»
14 years 3 months ago
Multimodal transformed social interaction
Understanding human-human interaction is fundamental to the long-term pursuit of powerful and natural multimodal interfaces. Nonverbal communication, including body posture, gestu...
Matthew Turk, Jeremy N. Bailenson, Andrew C. Beall...
ICMI
2004
Springer
215views Biometrics» more  ICMI 2004»
14 years 3 months ago
Bimodal HCI-related affect recognition
Perhaps the most fundamental application of affective computing would be Human-Computer Interaction (HCI) in which the computer is able to detect and track the user’s affective ...
Zhihong Zeng, Jilin Tu, Ming Liu, Tong Zhang, Nich...
IPSN
2004
Springer
14 years 3 months ago
Backcasting: adaptive sampling for sensor networks
Wireless sensor networks provide an attractive approach to spatially monitoring environments. Wireless technology makes these systems relatively flexible, but also places heavy d...
Rebecca Willett, Aline Martin, Robert Nowak
IWMM
2004
Springer
98views Hardware» more  IWMM 2004»
14 years 3 months ago
Dynamic object sampling for pretenuring
Many state-of-the-art garbage collectors are generational, collecting the young nursery objects more frequently than old objects. These collectors perform well because young objec...
Maria Jump, Stephen M. Blackburn, Kathryn S. McKin...
« Prev « First page 1598 / 1636 Last » Next »