Sciweavers

13043 search results - page 2348 / 2609
» Simulation of the research process
Sort
View
ACSC
2006
IEEE
15 years 10 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi
AVSS
2006
IEEE
15 years 10 months ago
Multimedia Surveillance and Monitoring
Most surveillance and monitoring systems nowadays utilize multiple types of sensors. However, due to the asynchrony among and diversity of sensors, information assimilation how to...
Mohan S. Kankanhalli
ICALT
2006
IEEE
15 years 10 months ago
Vicarious Learning and Multimodal Dialogue
Vicarious Learning is learning from watching others learn. We believe that this is a powerful model for computer-based learning. Learning episodes can be captured and replayed to ...
John Lee
NOMS
2006
IEEE
146views Communications» more  NOMS 2006»
15 years 10 months ago
BGP-Inspect - Extracting Information from Raw BGP Data
— While BGP routing datasets, consisting of raw routing data, are freely available and easy to obtain, extracting any useful information is tedious. Currently, researcher and net...
Dionysus Blazakis, Manish Karir, John S. Baras
MM
2006
ACM
175views Multimedia» more  MM 2006»
15 years 10 months ago
Diversifying the image retrieval results
In the area of image retrieval, post-retrieval processing is often used to refine the retrieval results to better satisfy users’ requirements. Previous methods mainly focus on p...
Kai Song, YongHong Tian, Wen Gao, Tiejun Huang
« Prev « First page 2348 / 2609 Last » Next »