Sciweavers

12637 search results - page 2466 / 2528
» Security for Extensible Systems
Sort
View
ELPUB
2006
ACM
14 years 1 months ago
A New Concept in High Resolution Internet Image Browsing
Various new imaging techniques have been used at the C2RMF, in order to digitize paintings and objects. These techniques are used for extensive and detailed non-destructive analys...
Denis Pitzalis, Ruven Pillay, Christian Lahanier
IMC
2006
ACM
14 years 1 months ago
Touring the internet in a TCP sidecar
An accurate router-level topology of the Internet would benefit many research areas, including network diagnosis, inter-domain traffic engineering, and overlay construction. We ...
Rob Sherwood, Neil Spring
ITICSE
2006
ACM
14 years 1 months ago
Gender gap in computer science does not exist in one former soviet republic: results of a study
It is well known that women’s involvement in the field of Computer Science is very low in the USA. This is viewed as a significant problem and has become a great concern to educ...
Hasmik Gharibyan, Stephan Gunsaulus
MM
2006
ACM
330views Multimedia» more  MM 2006»
14 years 1 months ago
Visual attention detection in video sequences using spatiotemporal cues
Human vision system actively seeks interesting regions in images to reduce the search effort in tasks, such as object detection and recognition. Similarly, prominent actions in v...
Yun Zhai, Mubarak Shah
MOBICOM
2006
ACM
14 years 1 months ago
On accurate measurement of link quality in multi-hop wireless mesh networks
This paper presents a highly efficient and accurate link-quality measurement framework, called EAR (Efficient and Accurate link-quality monitoR), for multi-hop wireless mesh net...
Kyu-Han Kim, Kang G. Shin
« Prev « First page 2466 / 2528 Last » Next »