Sciweavers

2714 search results - page 389 / 543
» Under the table interaction
Sort
View
IV
2006
IEEE
210views Visualization» more  IV 2006»
15 years 10 months ago
FFT and Convolution Performance in Image Filtering on GPU
Many contemporary visualization tools comprise some image filtering approach. Since image filtering approaches are very computationally demanding, the acceleration using graphic...
Ondirej Fialka, Martin Cadík
NDSS
2006
IEEE
15 years 10 months ago
Isolating Intrusions by Automatic Experiments
When dealing with malware infections, one of the first tasks is to find the processes that were involved in the attack. We introduce Malfor, a system that isolates those process...
Stephan Neuhaus, Andreas Zeller
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
15 years 10 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
ACMSE
2006
ACM
15 years 10 months ago
Automatic support for testing web-based enterprise applications
In this paper we consider the problem of automatically generating test suites associated with web-based enterprise systems. In particular, we discuss the construction of a tool de...
Arturo Sanchez, Brandon Vega, Alexander Gonzalez, ...
161
Voted
IWCMC
2006
ACM
15 years 10 months ago
Low complexity virtual antenna arrays using cooperative relay selection
We study the diversity-multiplexing tradeoff in cooperative diversity systems involving multiple relays. We focus on low complexity architectures that do not require simultaneous...
Aggelos Bletsas, Ashish Khisti, Moe Z. Win