Sciweavers

1804 search results - page 286 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
CC
2008
Springer
193views System Software» more  CC 2008»
13 years 11 months ago
Automatic Transformations for Communication-Minimized Parallelization and Locality Optimization in the Polyhedral Model
The polyhedral model provides powerful abstractions to optimize loop nests with regular accesses. Affine transformations in this model capture a complex sequence of execution-reord...
Uday Bondhugula, Muthu Manikandan Baskaran, Sriram...
CHI
2003
ACM
14 years 9 months ago
A tangible interface for IP network simulation
We present the IP Network Design Workbench which supports collaborative network design and simulation by a group of experts and customers. This system is based on a tangible user ...
Kazue Kobayashi, Mitsunori Hirano, Atsunobu Narita...
IEAAIE
2009
Springer
14 years 3 months ago
RFID Technology and AI Techniques for People Location, Orientation and Guiding
One of the main problems that we have to face when visiting public or official buildings (i.e hospitals or public administrations) is the lack of information and signs that can gui...
M. D. R-Moreno, Bonifacio Castaño, Melquiad...
ER
2006
Springer
112views Database» more  ER 2006»
14 years 17 days ago
Deriving Concepts for Modeling Business Actions
We outline a procedure called communicative and material functions analysis that can be used to derive business modeling concepts. It is rooted in the language-action perspective o...
Peter Rittgen
SIGCOMM
2010
ACM
13 years 9 months ago
NeuroPhone: brain-mobile phone interface using a wireless EEG headset
Neural signals are everywhere just like mobile phones. We propose to use neural signals to control mobile phones for hands-free, silent and effortless human-mobile interaction. Un...
Andrew T. Campbell, Tanzeem Choudhury, Shaohan Hu,...