Sciweavers

452 search results - page 70 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
92
Voted
DSN
2005
IEEE
15 years 9 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
176
Voted
MTA
2011
263views Hardware» more  MTA 2011»
14 years 10 months ago
Event detection and recognition for semantic annotation of video
Research on methods for detection and recognition of events and actions in videos is receiving an increasing attention from the scientific community, because of its relevance for ...
Lamberto Ballan, Marco Bertini, Alberto Del Bimbo,...
104
Voted
HCI
2007
15 years 5 months ago
A New Method for Multi-finger Detection Using a Regular Diffuser
In this paper, we developed a fingertip finding algorithm working with a regular diffuser. The proposed algorithm works on images captured by infra-red cameras, settled on one side...
Li-Wei Chan, Yi-Fan Chuang, Yi-Wei Chia, Yi-Ping H...
106
Voted
ICWSM
2010
15 years 5 months ago
TweetMotif: Exploratory Search and Topic Summarization for Twitter
We present TweetMotif, an exploratory search application for Twitter. Unlike traditional approaches to information retrieval, which present a simple list of messages, TweetMotif g...
Brendan O'Connor, Michel Krieger, David Ahn
134
Voted
CHI
2010
ACM
15 years 8 months ago
Clutching at straws: using tangible interaction to provide non-visual access to graphs
We present a tangible user interface (TUI) called Tangible Graph Builder, that has been designed to allow visually impaired users to access graph and chart-based data. We describe...
David K. McGookin, Euan Robertson, Stephen A. Brew...