Sciweavers

3006 search results - page 501 / 602
» Overview
Sort
View
CSREASAM
2010
13 years 8 months ago
Keyloggers in Cybersecurity Education
Abstract-- Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, o...
Christopher Wood, Rajendra Raj
DEBU
2010
128views more  DEBU 2010»
13 years 8 months ago
Panda: A System for Provenance and Data
Panda (for Provenance and Data) is a new project whose goal is to develop a general-purpose system that unifies concepts from existing provenance systems and overcomes some limita...
Robert Ikeda, Jennifer Widom
DEBU
2010
139views more  DEBU 2010»
13 years 8 months ago
Refining Information Extraction Rules using Data Provenance
Developing high-quality information extraction (IE) rules, or extractors, is an iterative and primarily manual process, extremely time consuming, and error prone. In each iteratio...
Bin Liu 0002, Laura Chiticariu, Vivian Chu, H. V. ...
IJHPCA
2010
111views more  IJHPCA 2010»
13 years 8 months ago
Understanding Application Performance via Micro-benchmarks on Three Large Supercomputers: Intrepid, Ranger and Jaguar
Emergence of new parallel architectures presents new challenges for application developers. Supercomputers vary in processor speed, network topology, interconnect communication ch...
Abhinav Bhatele, Lukasz Wesolowski, Eric J. Bohm, ...
AUGHUMAN
2011
13 years 6 months ago
Full body interaction for serious games in motor rehabilitation
Serious games and especially their use in healthcare applications are an active and rapidly growing area of research. A key aspect of games in rehabilitation is 3D input. In this ...
Christian Schönauer, Thomas Pintaric, Hannes ...