Sciweavers

2192 search results - page 389 / 439
» Plumbing and Other Utilities
Sort
View
NSPW
2003
ACM
14 years 2 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
SIGUCCS
2003
ACM
14 years 2 months ago
Deep in benchmarking: using industry standards to assess a training program
At the University of Missouri – Columbia’s Information and Access Technology (IAT) Services, InfoTech Training compares the results of their IT training program with similar t...
Joleen Pfefer
WSNA
2003
ACM
14 years 2 months ago
Proximity interactions between wireless sensors and their application
Many applications in ubiquitous computing rely on knowing where people and objects are relative to each other. By placing small wireless sensors on people, at specific locations, ...
Waylon Brunette, Carl Hartung, Ben Nordstrom, Gaet...
CAIP
2003
Springer
133views Image Analysis» more  CAIP 2003»
14 years 2 months ago
Optimizing Eigenfaces by Face Masks for Facial Expression Recognition
A new direction in improving modern dialogue systems is to make a human-machine dialogue more similar to a human-human dialogue. This can be done by adding more input modalities. O...
Carmen Frank, Elmar Nöth
CIKM
2003
Springer
14 years 2 months ago
Online duplicate document detection: signature reliability in a dynamic retrieval environment
As online document collections continue to expand, both on the Web and in proprietary environments, the need for duplicate detection becomes more critical. Few users wish to retri...
Jack G. Conrad, Xi S. Guo, Cindy P. Schriber