Sciweavers

2500 search results - page 429 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
IUI
2009
ACM
14 years 5 months ago
You can play that again: exploring social redundancy to derive highlight regions in videos
Identifying highlights in multimedia content such as video and audio is currently a very difficult technical problem. We present and evaluate a novel algorithm that identifies hig...
Jose San Pedro, Vaiva Kalnikaité, Steve Whi...
ICDCN
2010
Springer
14 years 3 months ago
An Intelligent IT Infrastructure for the Future
The proliferation of new modes of communication and collaboration has resulted in an explosion of digital information. To turn this challenge into an opportunity, the IT industry ...
Prith Banerjee
ACSAC
2009
IEEE
14 years 3 months ago
Analyzing and Detecting Malicious Flash Advertisements
—The amount of dynamic content on the web has been steadily increasing. Scripting languages such as JavaScript and browser extensions such as Adobe’s Flash have been instrument...
Sean Ford, Marco Cova, Christopher Kruegel, Giovan...
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
14 years 3 months ago
A Systematic Approach to Improve Communication for Emergency Response
The importance of communication, information sharing and interoperability in an emergency response scenario have risen recently based on the frequency of disasters throughout the ...
Raheleh B. Dilmaghani, Ramesh R. Rao
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
14 years 3 months ago
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Frederick T. Sheldon, Robert K. Abercrombie, Ali M...