Sciweavers

138 search results - page 22 / 28
» 06371 Abstracts Collection -- From Security to Dependability
Sort
View
AIRS
2008
Springer
13 years 9 months ago
Comparing Dissimilarity Measures for Content-Based Image Retrieval
Abstract. Dissimilarity measurement plays a crucial role in contentbased image retrieval, where data objects and queries are represented as vectors in high-dimensional content feat...
Haiming Liu 0002, Dawei Song, Stefan M. Rüger...
IFIP
2010
Springer
13 years 11 months ago
Processing of Flow Accounting Data in Java: Framework Design and Performance Evaluation
Abstract Flow Accounting is a passive monitoring mechanism implemented in routers that gives insight into trac behavior and network characteristics. However, processing of Flow Ac...
Jochen Kögel, Sebastian Scholz
CAISE
2009
Springer
13 years 11 months ago
Ontology-Based Description and Discovery of Business Processes
Just like web services, business processes can be stored in public repositories to be shared and used by third parties, e.g., as building blocks for constructing new business proce...
Khalid Belhajjame, Marco Brambilla
ETRICS
2006
13 years 11 months ago
Policy-Based Integration of User and Provider-Sided Identity Management
Abstract. Depending on whether the users or the providers are performing it, Identity Management (IM) traditionally has different meanings. For users, IM means to choose between on...
Wolfgang Hommel
ICETE
2004
253views Business» more  ICETE 2004»
13 years 9 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong