Sciweavers

1252 search results - page 229 / 251
» Foundations of Similarity and Utility
Sort
View
IRI
2003
IEEE
14 years 2 months ago
Damage Pattern Mining in Hurricane Image Databases
– We present a damage pattern mining framework for hurricane data on residential houses using aerial photographs with 1:3000 based scale. The vertical photographs are normally co...
Shu-Ching Chen, Mei-Ling Shyu, Chengcui Zhang, Wal...
P2P
2003
IEEE
130views Communications» more  P2P 2003»
14 years 2 months ago
Peer-to-Peer Wireless LAN Consortia: Economic Modeling and Architecture
Abstract—In this paper we explore the incentive and architectural issues that arise in Consortia of Peer-to-Peer Wireless Local Area Networks. A P2P WLAN Consortium (PWC) is a co...
Panayotis Antoniadis, Costas Courcoubetis, Elias C...
SAINT
2003
IEEE
14 years 2 months ago
Jini Meets UPnP: An Architecture for Jini/UPnP Interoperability
A service discovery framework provides a collection of protocols for developing dynamic client/server applications, allowing clients to find and use services without any previous ...
Jérémie Allard, V. Chinta, S. Gundal...
NSPW
2003
ACM
14 years 2 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
SIGUCCS
2003
ACM
14 years 2 months ago
Deep in benchmarking: using industry standards to assess a training program
At the University of Missouri – Columbia’s Information and Access Technology (IAT) Services, InfoTech Training compares the results of their IT training program with similar t...
Joleen Pfefer