Sciweavers

542 search results - page 73 / 109
» Active management of multi-service networks
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Attack Plan Recognition and Prediction Using Causal Networks
Correlating and analyzing security alerts is a critical and challenging task in security management. Recently, some techniques have been proposed for security alert correlation. H...
Xinzhou Qin, Wenke Lee
ICPR
2008
IEEE
14 years 9 months ago
A probabilistic Self-Organizing Map for facial recognition
This article presents a method aiming at quantifying the visual similarity between an image and a class model. This kind of problem is recurrent in many applications such as objec...
Christophe Garcia, Grégoire Lefebvre
PERCOM
2009
ACM
14 years 8 months ago
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
In pervasive computing environments, personal information is expressed in digital forms to a great extent. Daily activities and personal preferences may be easily associated with p...
Feng Zhu, Wei Zhu
MJ
2008
111views more  MJ 2008»
13 years 7 months ago
CMOL: Second life for silicon
This report is a brief review of the recent work on architectures for the prospective hybrid CMOS/nanowire/ nanodevice ("CMOL") circuits including digital memories, reco...
Konstantin K. Likharev
DATE
2006
IEEE
78views Hardware» more  DATE 2006»
14 years 1 months ago
Wireless sensor networks and beyond
—Wireless Sensor Networks provide opportunities even outside their usual application domain of environmental monitoring. In this paper we present a case study on the use of Wirel...
Paul J. M. Havinga