Sciweavers

3511 search results - page 649 / 703
» Evaluation Methods for Groupware Systems
Sort
View
INFOCOM
2007
IEEE
14 years 2 months ago
Protecting Receiver-Location Privacy in Wireless Sensor Networks
—Due to the open nature of a sensor network, it is relatively easy for an adversary to eavesdrop and trace packet movement in the network in order to capture the receiver physica...
Ying Jian, Shigang Chen, Zhan Zhang, Liang Zhang
NCA
2007
IEEE
14 years 2 months ago
Towards IQ-Appliances: Quality-awareness in Information Virtualization
Our research addresses two important problems that arise in modern large-scale distributed systems: (1) the necessity to virtualize their data flows by applying actions such as ...
Radhika Niranjan, Ada Gavrilovska, Karsten Schwan,...
SEMWEB
2007
Springer
14 years 2 months ago
TaxoMap in the OAEI 2007 Alignment Contest
This paper presents our first participation in the OAEI 2007 campaign. It describes an approach to align taxonomies which relies on terminological and structural techniques applie...
Haïfa Zargayouna, Brigitte Safar, Chantal Rey...
ACSC
2006
IEEE
14 years 2 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi
MM
2006
ACM
103views Multimedia» more  MM 2006»
14 years 2 months ago
Progressive cut
Recently, interactive image cutout technique becomes prevalent for image segmentation problem due to its easy-to-use nature. However, most existing stroke-based interactive object...
Chao Wang, Qiong Yang, Mo Chen, Xiaoou Tang, Zhong...