Sciweavers

2337 search results - page 420 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
SIGCOMM
2009
ACM
14 years 2 months ago
A standalone content sharing application for spontaneous communities of mobile handhelds
This demo illustrates the benefits of BitHoc, a standalone protocol for content sharing among spontaneous communities of mobile handhelds using wireless multi-hop connections. Bi...
Amir Krifa, Mohamed Karim Sbai, Chadi Barakat, Thi...
ISDA
2005
IEEE
14 years 1 months ago
Smart Archive: a Component-based Data Mining Application Framework
Implementation of data mining applications is a challenging and complicated task, and the applications are often built from scratch. In this paper, a component-based application f...
Perttu Laurinen, Lauri Tuovinen, Juha Röning
HICSS
2003
IEEE
156views Biometrics» more  HICSS 2003»
14 years 28 days ago
Developing Video Services for Mobile Users
Video information, image processing and computer vision techniques are developing rapidly nowadays because of the availability of acquisition, processing and editing tools, which ...
Mohamed Ahmed, Roger Impey, Ahmed Karmouch
PREMI
2007
Springer
14 years 1 months ago
Self Adaptable Recognizer for Document Image Collections
Abstract. This paper presents an architecture that enables the recognizer to learn incrementally and, thereby adapt to document image collections for performance improvement. We ar...
Million Meshesha, C. V. Jawahar
ICS
2004
Tsinghua U.
14 years 1 months ago
EXPERT: expedited simulation exploiting program behavior repetition
Studying program behavior is a central component in architectural designs. In this paper, we study and exploit one aspect of program behavior, the behavior repetition, to expedite...
Wei Liu, Michael C. Huang