Sciweavers

11097 search results - page 2164 / 2220
» Hera presentation generator
Sort
View
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 8 months ago
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characteriz
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these proto...
Danilo Valeros Bernardo, Doan B. Hoang
CVIU
2008
296views more  CVIU 2008»
13 years 8 months ago
Image segmentation evaluation: A survey of unsupervised methods
Image segmentation is an important processing step in many image, video and computer vision applications. Extensive research has been done in creating many different approaches an...
Hui Zhang, Jason E. Fritts, Sally A. Goldman
ECR
2010
129views more  ECR 2010»
13 years 8 months ago
The design of a reliable reputation system
Next generation Web 2.0 communities and distributed P2P systems rely on the cooperation of diverse user populations spread across numerous administrative and security domains. Zero...
Gayatri Swamynathan, Kevin C. Almeroth, Ben Y. Zha...
DCG
2008
118views more  DCG 2008»
13 years 8 months ago
General-Dimensional Constrained Delaunay and Constrained Regular Triangulations, I: Combinatorial Properties
Two-dimensional constrained Delaunay triangulations are geometric structures that are popular for interpolation and mesh generation because they respect the shapes of planar domai...
Jonathan Richard Shewchuk
AAMAS
2006
Springer
13 years 8 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
« Prev « First page 2164 / 2220 Last » Next »