Sciweavers

2411 search results - page 407 / 483
» The challenge of information visualization evaluation
Sort
View
AOSD
2010
ACM
15 years 10 months ago
A permission system for secure AOP
The integration of third-party aspects into applications creates security challenges. Due to the intrusive impact of aspects, one cannot guarantee that the dynamic composition of ...
Wouter De Borger, Bart De Win, Bert Lagaisse, Wout...
EUROSEC
2010
ACM
15 years 10 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
138
Voted
SIGIR
2003
ACM
15 years 9 months ago
Distributed Web Search as a Stochastic Game
Distributed search systems are an emerging phenomenon in Web search, in which independent topic-specific search engines provide search services, and metasearchers distribute user...
Rinat Khoussainov, Nicholas Kushmerick
181
Voted
ICMI
2003
Springer
184views Biometrics» more  ICMI 2003»
15 years 9 months ago
Real time facial expression recognition in video using support vector machines
Enabling computer systems to recognize facial expressions and infer emotions from them in real time presents a challenging research topic. In this paper, we present a real time ap...
Philipp Michel, Rana El Kaliouby
121
Voted
DATE
2010
IEEE
180views Hardware» more  DATE 2010»
15 years 9 months ago
Reliability- and process variation-aware placement for FPGAs
Abstract—Negative bias temperature instability (NBTI) significantly affects nanoscale integrated circuit performance and reliability. The degradation in threshold voltage (Vth) d...
Assem A. M. Bsoul, Naraig Manjikian, Li Shang