Sciweavers

323 search results - page 38 / 65
» Alert Detection in System Logs
Sort
View
SISW
2003
IEEE
14 years 20 days ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
ICPR
2010
IEEE
14 years 2 months ago
Discrimination of Moderate and Acute Drowsiness Based on Spontaneous Facial Expressions
It is important for drowsiness detection systems to warn the driver before the critical stages of drowsiness arise and thus to provide sufficient intervention time for the driver...
Esra Vural, Marian Stewart Bartlett, Gwen Littlewo...
FC
2005
Springer
149views Cryptology» more  FC 2005»
14 years 28 days ago
Ciphire Mail Email Encryption and Authentication
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Lars Eilebrecht
ICDE
2010
IEEE
198views Database» more  ICDE 2010»
14 years 22 days ago
Power-aware data analysis in sensor networks
Abstract— Sensor networks have evolved to a powerful infrastructure component for event monitoring in many application scenarios. In addition to simple filter and aggregation op...
Daniel Klan, Katja Hose, Marcel Karnstedt, Kai-Uwe...
ASSETS
2008
ACM
13 years 9 months ago
Computer vision-based clear path guidance for blind wheelchair users
We describe a system for guiding blind and visually impaired wheelchair users along a clear path that uses computer vision to sense the presence of obstacles or other terrain feat...
Volodymyr Ivanchenko, James Coughlan, William Gerr...