Sciweavers

5544 search results - page 1037 / 1109
» Three Inadequate Models
Sort
View
AFRIGRAPH
2006
ACM
14 years 1 months ago
A GPU based saliency map for high-fidelity selective rendering
The computation of high-fidelity images in real-time remains one of the key challenges for computer graphics. Recent work has shown that by understanding the human visual system,...
Peter Longhurst, Kurt Debattista, Alan Chalmers
CONEXT
2006
ACM
14 years 1 months ago
Synergy: blending heterogeneous measurement elements for effective network monitoring
Network traffic matrices are important for various network planning and management operations. Previous work for estimation of traffic matrices is based on either link load record...
Awais Ahmed Awan, Andrew W. Moore
ELPUB
2006
ACM
14 years 1 months ago
CityInMyPocket: Digital Walking Guides
By the end of this year visitors to the Flemish town of Mechelen can discover the city with the help of the new CityInMyPocket walking guide. Instead of following a person or a bo...
Steven Depuydt, Jeroen Vanattenhoven, Jan Engelen
IMC
2006
ACM
14 years 1 months ago
A multifaceted approach to understanding the botnet phenomenon
The academic community has long acknowledged the existence of malicious botnets, however to date, very little is known about the behavior of these distributed computing platforms....
Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, And...
MSR
2006
ACM
14 years 1 months ago
Detecting similar Java classes using tree algorithms
Similarity analysis of source code is helpful during development to provide, for instance, better support for code reuse. Consider a development environment that analyzes code whi...
Tobias Sager, Abraham Bernstein, Martin Pinzger, C...
« Prev « First page 1037 / 1109 Last » Next »