Sciweavers

2290 search results - page 349 / 458
» Extensible Protected Types
Sort
View
ICMI
2004
Springer
152views Biometrics» more  ICMI 2004»
15 years 7 months ago
Exploiting prosodic structuring of coverbal gesticulation
Although gesture recognition has been studied extensively, communicative, affective, and biometrical “utility” of natural gesticulation remains relatively unexplored. One of t...
Sanshzar Kettebekov
ICSR
2004
Springer
15 years 7 months ago
Feature Dependency Analysis for Product Line Component Design
Analyzing commonalities and variabilities among products of a product line is an essential activity for product line asset development. A feature-oriented approach to commonality a...
Kwanwoo Lee, Kyo Chul Kang
SPIRE
2004
Springer
15 years 7 months ago
Longest Motifs with a Functionally Equivalent Central Block
This paper presents a generalization of the notion of longest repeats with a block of k don’t care symbols introduced by [8] (for k fixed) to longest motifs composed of three pa...
Maxime Crochemore, Raffaele Giancarlo, Marie-Franc...
WEBDB
2004
Springer
143views Database» more  WEBDB 2004»
15 years 7 months ago
DTDs versus XML Schema: A Practical Study
Among the various proposals answering the shortcomings of Document Type Definitions (DTDs), XML Schema is the most widely used. Although DTDs and XML Schema Defintions (XSDs) di...
Geert Jan Bex, Frank Neven, Jan Van den Bussche
ACSAC
2003
IEEE
15 years 7 months ago
An IP Traceback Technique against Denial-of-Service Attacks
Reflector attack [9] belongs to one of the most serious types of Denial-of-Service (DoS) attacks, which can hardly be traced by contemporary traceback techniques, since the marked...
Zhaole Chen, Moon-Chuen Lee