Sciweavers

37217 search results - page 7369 / 7444
» or 2010
Sort
View
CORR
2010
Springer
257views Education» more  CORR 2010»
13 years 6 months ago
Survey on Various Gesture Recognition Techniques for Interfacing Machines Based on Ambient Intelligence
Gesture recognition is mainly apprehensive on analyzing the functionality of human wits. The main goal of gesture recognition is to create a system which can recognize specific hu...
Harshith C, Karthik R. Shastry, Manoj Ravindran, M...
CORR
2010
Springer
115views Education» more  CORR 2010»
13 years 6 months ago
Novel Mechanism to Defend DDoS Attacks Caused by Spam
Corporate mail services are designed to perform better than public mail services. Fast mail delivery, large size file transfer as an attachments, high level spam and virus protect...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 6 months ago
An In-depth Analysis of Spam and Spammers
Electronic mail services have become an important source of communication for millions of people all over the world. Due to this tremendous growth, there has been a significant in...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...
CORR
2010
Springer
174views Education» more  CORR 2010»
13 years 6 months ago
A Proof Carrying Code Framework for Inlined Reference Monitors in Java Bytecode
We propose a lightweight approach for certification of Java bytecode monitor inlining using proof-carrying code. The main purpose of such a framework is to enable development use ...
Mads Dam, Andreas Lundblad
CORR
2010
Springer
137views Education» more  CORR 2010»
13 years 6 months ago
Seamless Flow Migration on Smartphones without Network Support
This paper addresses the following question: Is it possible to migrate TCP/IP flows between different networks on modern mobile devices, without infrastructure support or protocol...
Ahmad Rahmati, Clayton Shepard, Chad Tossell, Ange...
« Prev « First page 7369 / 7444 Last » Next »