Sciweavers

2236 search results - page 388 / 448
» Intrusion detection techniques and approaches
Sort
View
ICIP
2002
IEEE
14 years 10 months ago
An improved error control paradigm for multimedia transmission over wireless networks
Providing quality-of-service (QoS) guarantees over wireless packet networks requires thorough understanding and quantification of the interactions among the traffic source, the wi...
Mohamed F. Mansour, Abed Elhamid Lawabni, Ahmed H....
VIS
2007
IEEE
152views Visualization» more  VIS 2007»
14 years 10 months ago
An Effective Illustrative Visualization Framework Based on Photic Extremum Lines (PELs)
Conveying shape using feature lines is an important visualization tool in visual computing. The existing feature lines (e.g., ridges, valleys, silhouettes, suggestive contours, etc...
Xuexiang Xie, Ying He, Feng Tian, Hock-Soon Sea...
MICCAI
2009
Springer
14 years 10 months ago
Probabilistic Region Matching in Narrow-Band Endoscopy for Targeted Optical Biopsy
Recent advances in biophotonics have enabled in-vivo, in-situ histopathology for routine clinical applications. The non-invasive nature of these optical `biopsy' techniques, h...
Selen Atasoy, Ben Glocker, Stamatia Giannarou, ...
CHI
2001
ACM
14 years 9 months ago
Sensetable: a wireless object tracking platform for tangible user interfaces
In this paper we present a system that electromagnetically tracks the positions and orientations of multiple wireless objects on a tabletop display surface. The system offers two ...
James Patten, Hiroshi Ishii, Jim Hines, Gian Panga...
ICSE
2005
IEEE-ACM
14 years 9 months ago
Monitoring and control in scenario-based requirements analysis
Scenarios are an effective means for eliciting, validating and documenting requirements. At the requirements level, scenarios describe sequences of interactions between the softwa...
Emmanuel Letier, Jeff Kramer, Jeff Magee, Sebasti&...