Sciweavers

1737 search results - page 315 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
CVPR
2009
IEEE
15 years 4 months ago
Recognizing Realistic Actions from Videos in the Wild
In this paper, we present a systematic framework for re-cognizing realistic actions from videos “in the wild.” Such unconstrained videos are abundant in personal collections as...
Jingen Liu (University of Central Florida), Jiebo ...
ENTCS
2007
178views more  ENTCS 2007»
13 years 9 months ago
Recent Advances in Real-Time Maude
This paper gives an overview of recent advances in Real-Time Maude. Real-Time Maude extends the Maude rewriting logic tool to support formal specification and analysis of object-...
Peter Csaba Ölveczky, José Meseguer
NSDI
2008
13 years 11 months ago
Peeking into Spammer Behavior from a Unique Vantage Point
Understanding the spammer behavior is a critical step in the long-lasting battle against email spams. Previous studies have focused on setting up honeypots or email sinkholes cont...
Abhinav Pathak, Y. Charlie Hu, Zhuoqing Morley Mao
BMCBI
2008
115views more  BMCBI 2008»
13 years 9 months ago
Systems biology driven software design for the research enterprise
Background: In systems biology, and many other areas of research, there is a need for the interoperability of tools and data sources that were not originally designed to be integr...
John Boyle, Christopher C. Cavnor, Sarah A. Killco...
CORR
2004
Springer
208views Education» more  CORR 2004»
13 years 9 months ago
Business Intelligence from Web Usage Mining
The rapid e-commerce growth has made both business community and customers face a new situation. Due to intense competition on the one hand and the customer's option to choose...
Ajith Abraham