Sciweavers

1737 search results - page 314 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
NDSS
2008
IEEE
14 years 3 months ago
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority
We study and document an important development in how attackers are using Internet resources: the creation of malicious DNS resolution paths. In this growing form of attack, victi...
David Dagon, Niels Provos, Christopher P. Lee, Wen...
CHI
2007
ACM
14 years 9 months ago
The life and death of online gaming communities: a look at guilds in world of warcraft
Massively multiplayer online games (MMOGs) can be fascinating laboratories to observe group dynamics online. In particular, players must form persistent associations or "guil...
Nicolas Ducheneaut, Nicholas Yee, Eric Nickell, Ro...
ICMI
2004
Springer
235views Biometrics» more  ICMI 2004»
14 years 2 months ago
Multimodal detection of human interaction events in a nursing home environment
In this paper, we propose a multimodal system for detecting human activity and interaction patterns in a nursing home. Activities of groups of people are firstly treated as intera...
Datong Chen, Robert Malkin, Jie Yang
MM
1996
ACM
168views Multimedia» more  MM 1996»
14 years 1 months ago
CVEPS - A Compressed Video Editing and Parsing System
Processing digital video directly in the compressed domain has many advantages in terms of storage efficiency, speed, and video quality. We have developed a compressed video editi...
Jianhao Meng, Shih-Fu Chang
SI3D
1997
ACM
14 years 1 months ago
Attention and Visual Feedback: The Bimanual Frame of Reference
We investigate the synergy of the two hands for virtual object manipulation. We report results from an experiment which suggest that the two hands together provide sufficient per...
Ken Hinckley, Randy F. Pausch, Dennis Proffitt