Sciweavers

1356 search results - page 58 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
MA
2010
Springer
149views Communications» more  MA 2010»
13 years 6 months ago
A nonparametric approach to 3D shape analysis from digital camera images - I
In this article, for the first time, one develops a nonparametric methodology for an analysis of shapes of configurations of landmarks on real 3D objects from regular camera pho...
V. Patrangenaru, X. Liu, S. Sugathadasa
ACSAC
2010
IEEE
13 years 6 months ago
Kells: a protection framework for portable data
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
BMCBI
2006
202views more  BMCBI 2006»
13 years 8 months ago
DWARF - a data warehouse system for analyzing protein families
Background: The emerging field of integrative bioinformatics provides the tools to organize and systematically analyze vast amounts of highly diverse biological data and thus allo...
Markus Fischer, Quan K. Thai, Melanie Grieb, J&uum...
GECCO
2008
Springer
199views Optimization» more  GECCO 2008»
13 years 9 months ago
Analysis of multi-objective evolutionary algorithms to optimize dynamic data types in embedded systems
New multimedia embedded applications are increasingly dynamic, and rely on Dynamically-allocated Data Types (DDTs) to store their data. The optimization of DDTs for each target em...
José Ignacio Hidalgo, José L. Risco-...
BROADNETS
2006
IEEE
14 years 2 months ago
Secure Diffusion for Wireless Sensor Networks
— Data dissemination is an indispensible protocol component for the emerging large-scale sensor networks. In this paper, we propose a secure data dissemination protocol that enha...
Hao Yang, Starsky H. Y. Wong, Songwu Lu, Lixia Zha...