Sciweavers

2833 search results - page 475 / 567
» Visualization for information exploration and analysis
Sort
View
ISCC
2006
IEEE
127views Communications» more  ISCC 2006»
14 years 3 months ago
Aggregating Distributed Sensor Data for Network Intrusion Detection
Distributed network intrusion detection systems which incorporate tens, hundreds, even thousands, of sensors are becoming increasing popular. Managing and presenting the informati...
John C. McEachen, Cheng Kah Wai, Vonda L. Olsavsky
ROBIO
2006
IEEE
120views Robotics» more  ROBIO 2006»
14 years 3 months ago
Event Based Methodology for SuperMedia Enhanced Teleoperation
- SuperMedia provides human operators rich environmental information, thus providing telepresence and enhances efficiency of operation. However, coupling human with the remote envi...
Yang Liu, Amit Goradia, Yonghui Xue, Ning Xi
SOUPS
2006
ACM
14 years 3 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
MM
2003
ACM
116views Multimedia» more  MM 2003»
14 years 2 months ago
Photo2Video
To exploit rich content embedded in a single photograph, a system named Photo2Video was developed to automatically convert a photographic series into a video by simulating camera ...
Xian-Sheng Hua, Lie Lu, HongJiang Zhang
LATIN
2010
Springer
14 years 2 months ago
The Power of Fair Pricing Mechanisms
We explore the revenue capabilities of truthful, monotone (“fair”) allocation and pricing functions for resource-constrained auction mechanisms within a general framework that ...
Christine Chung, Katrina Ligett, Kirk Pruhs, Aaron...