Sciweavers

3374 search results - page 551 / 675
» Explaining Similarity of Terms
Sort
View
128
Voted
EUROSYS
2008
ACM
16 years 20 days ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
169
Voted
ALT
2008
Springer
16 years 16 days ago
Computational Models of Neural Representations in the Human Brain
Abstract For many centuries scientists have wondered how the human brain represents thoughts in terms of the underlying biology of neural activity. Philosophers, linguists, cogniti...
Tom M. Mitchell
107
Voted
CSCW
2010
ACM
16 years 13 days ago
What's it worth to you?: the costs and affordances of CMC tools to asian and american users
In recent years, a growing number of studies examining how culture shapes computer-mediated communication (CMC) have appeared in the CHI and CSCW literature. Findings from these s...
Leslie D. Setlock, Susan R. Fussell
CVPR
2010
IEEE
16 years 1 days ago
Geodesic Graph Cut for Interactive Image Segmentation
Interactive segmentation is useful for selecting objects of interest in images and continues to be a topic of much study. Methods that grow regions from foreground/background seed...
Brian Price, Bryan Morse, Scott Cohen
135
Voted
WWW
2010
ACM
15 years 10 months ago
Statistical models of music-listening sessions in social media
User experience in social media involves rich interactions with the media content and other participants in the community. In order to support such communities, it is important to...
Elena Zheleva, John Guiver, Eduarda Mendes Rodrigu...