Sciweavers

412 search results - page 46 / 83
» A Structural Framework for Modeling Multi-Stage Network Atta...
Sort
View
GIS
2003
ACM
14 years 8 months ago
Computational data modeling for network-constrained moving objects
Advances in wireless communications, positioning technology, and other hardware technologies combine to enable a range of applications that use a mobile user's geo-spatial da...
Laurynas Speicys, Christian S. Jensen, Augustas Kl...
CIVR
2004
Springer
111views Image Analysis» more  CIVR 2004»
14 years 1 months ago
An Inference Network Approach to Image Retrieval
Most image retrieval systems only allow a fragment of text or an example image as a query. Most users have more complex information needs that are not easily expressed in either of...
Donald Metzler, R. Manmatha
ISORC
2000
IEEE
14 years 1 days ago
Establishing a Data-Mining Environment for Wartime Event Prediction with an Object-Oriented Command and Control Database
This paper documents progress to date on a research project, the goal of which is wartime event prediction. The paper describes the operational concept, the datamining environment...
Marion G. Ceruti, S. Joe McCarthy
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
13 years 8 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
INFOCOM
2009
IEEE
14 years 2 months ago
Diverse Routing in Networks with Probabilistic Failures
—We develop diverse routing schemes for dealing with multiple, possibly correlated, failures. While disjoint path protection can effectively deal with isolated single link failur...
Hyang-Won Lee, Eytan Modiano