Sciweavers

17471 search results - page 3399 / 3495
» Information Modeling
Sort
View
IPCCC
2006
IEEE
14 years 4 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
IV
2006
IEEE
104views Visualization» more  IV 2006»
14 years 4 months ago
Easy Grocery: 3D Visualization in e-Grocery
There are many deficiencies in the traditional electronic commerce schema. The main problem for consideration is the text and picture based design that underpins current HTML syst...
J. Somerville, Liz J. Stuart, N. Barlow
ACMACE
2006
ACM
14 years 4 months ago
Sketching-out virtual humans: from 2D storyboarding to immediate 3D character animation
Virtual beings are playing a remarkable role in today’s public entertainment, while ordinary users are still treated as audiences due to the lack of appropriate expertise, equip...
Chen Mao, Sheng Feng Qin, David K. Wright
IMC
2006
ACM
14 years 4 months ago
Semi-automated discovery of application session structure
While the problem of analyzing network traffic at the granularity of individual connections has seen considerable previous work and tool development, understanding traffic at a ...
Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Ca...
JCDL
2006
ACM
176views Education» more  JCDL 2006»
14 years 4 months ago
A hierarchical, HMM-based automatic evaluation of OCR accuracy for a digital library of books
A number of projects are creating searchable digital libraries of printed books. These include the Million Book Project, the Google Book project and similar efforts from Yahoo an...
Shaolei Feng, R. Manmatha
« Prev « First page 3399 / 3495 Last » Next »