Sciweavers

557 search results - page 9 / 112
» The L4.verified Project - Next Steps
Sort
View
IEEEIAS
2009
IEEE
14 years 3 months ago
Detecting Stepping-Stone Intruders with Long Connection Chains
: A common technique hacker use is to route their traffic through a chain of stepping-stone hosts. It is generally agreed that there is no valid reason to use a long connection cha...
Wei Ding, Matthew J. Hausknecht, Shou-Hsuan Stephe...
ISWC
2003
IEEE
14 years 2 months ago
First Steps Towards Handheld Augmented Reality
In this paper we describe the first stand-alone Augmented Reality (AR) system with self-tracking running on an unmodified personal digital assistant (PDA) with a commercial camera...
Daniel Wagner, Dieter Schmalstieg
KI
2008
Springer
13 years 8 months ago
On Restaurants and Requirements: How Requirements Engineering may be Facilitated by Scripts
Requirements engineering is a central part of software projects. It is assumed that two third of all errors in software projects are caused by forgotten requirements or mutual misu...
Christoph Peylo
LREC
2008
105views Education» more  LREC 2008»
13 years 10 months ago
Extraction and Evaluation of Keywords from Learning Objects: a Multilingual Approach
We report about a project which brings together Natural Language Processing and eLearning. One of the functionalities developed within this project is the possibility to annotate ...
Lothar Lemnitzer, Paola Monachesi
SIGPRO
2008
111views more  SIGPRO 2008»
13 years 8 months ago
Extension of the local subspace method to enhancement of speech with colored noise
Based on dynamic features of human speech, the local projection (LP) method has been adapted to the enhancement of speech corrupted by white noise. As an extension of the LP metho...
Junfeng Sun, Jie Zhang, Michael Small