Sciweavers

76 search results - page 4 / 16
» Evaluation and selection of an antivirus and content filteri...
Sort
View
HOTI
2005
IEEE
14 years 1 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
MMM
2007
Springer
212views Multimedia» more  MMM 2007»
14 years 1 months ago
MetaXa - Context- and Content-Driven Metadata Enhancement for Personal Photo Books
Making a photo book as a special gift to your beloved can be very time-consuming. One has to carefully select and arrange the pictures nicely over the pages of a previously bought ...
Susanne Boll, Philipp Sandhaus, Ansgar Scherp, Sab...
ICIP
2000
IEEE
14 years 9 months ago
Finite Precision Wavelets for Image Coding: Lossy and Lossless Compression Performance Evaluation
This paper investigates the robustness of the wavelet transform, implemented by means of the Lifting Scheme (LS), with respect to numerical errors in the representation and calcul...
Marco Grangetto, Enrico Magli, Gabriella Olmo
JSW
2007
123views more  JSW 2007»
13 years 7 months ago
A Taxonomy for a Constructive Approach to Software Evolution
Abstract— In many software design and evaluation techniques, either the software evolution problem is not systematically elaborated, or only the impact of evolution is considered...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
IUI
2010
ACM
14 years 4 months ago
Tell me more, not just "more of the same"
The Web makes it possible for news readers to learn more about virtually any story that interests them. Media outlets and search engines typically augment their information with l...
Francisco Iacobelli, Larry Birnbaum, Kristian J. H...