Sciweavers

522 search results - page 102 / 105
» What's a Typical Commit
Sort
View
IEEECIT
2010
IEEE
13 years 6 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
INFOCOM
2010
IEEE
13 years 6 months ago
Improving QoS in BitTorrent-like VoD Systems
—In recent years a number of research efforts have focused on effective use of P2P-based systems in providing large scale video streaming services. In particular, live streaming ...
Yan Yang, Alix L. H. Chow, Leana Golubchik, Daniel...
MM
2010
ACM
150views Multimedia» more  MM 2010»
13 years 6 months ago
Photo2Trip: generating travel routes from geo-tagged photos for trip planning
Travel route planning is an important step for a tourist to prepare his/her trip. As a common scenario, a tourist usually asks the following questions when he/she is planning his/...
Xin Lu, Changhu Wang, Jiang-Ming Yang, Yanwei Pang...
TSE
2010
118views more  TSE 2010»
13 years 6 months ago
Exception Handling Patterns for Process Modeling
—Process modeling allows for analysis and improvement of processes that coordinate multiple people and tools working together to carry out a task. Process modeling typically focu...
Barbara Staudt Lerner, Stefan Christov, Leon J. Os...
VR
2010
IEEE
147views Virtual Reality» more  VR 2010»
13 years 6 months ago
Avatar self-embodiment enhances distance perception accuracy in non-photorealistic immersive virtual environments
Non-photorealistically rendered (NPR) immersive virtual environments (IVEs) can facilitate conceptual design in architecture by enabling preliminary design sketches to be previewe...
Lane Phillips, Brian Ries, Michael Kaeding, Victor...