Sciweavers

1195 search results - page 141 / 239
» What, Where
Sort
View
CSCW
2004
ACM
14 years 3 months ago
The multiple views of inter-organizational authoring
Collaborative authoring is a common workplace task. Yet, despite improvements in word processors, communication software, and file sharing, many problems continue to plague co-aut...
David W. McDonald, Chunhua Weng, John H. Gennari
NSPW
2004
ACM
14 years 3 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
SC
2004
ACM
14 years 3 months ago
Experiences in Design and Implementation of a High Performance Transport Protocol
This paper describes our experiences in the development of the UDP-based Data Transport (UDT) protocol, an application level transport protocol used in distributed data intensive ...
Yunhong Gu, Xinwei Hong, Robert L. Grossman
CIVR
2004
Springer
200views Image Analysis» more  CIVR 2004»
14 years 3 months ago
HMM Model Selection Issues for Soccer Video
There has been a concerted effort from the Video Retrieval community to develop tools that automate the annotation process of Sports video. In this paper, we provide an in-depth i...
Mark Baillie, Joemon M. Jose, Cornelis Joost van R...
EUSAI
2004
Springer
14 years 3 months ago
Remote Code Execution on Ubiquitous Mobile Applications
Today, most mobile devices (e.g. PDAs) are in some way associated to a fixed personal computer or server. In general this relation is only taken into account for synchronization p...
João Nuno Silva, Paulo Ferreira