Sciweavers

191 search results - page 6 / 39
» Automated Spyware Collection and Analysis
Sort
View
HICSS
2010
IEEE
153views Biometrics» more  HICSS 2010»
14 years 2 months ago
Securing E-Government Assets through Automating Deployment of Honeynets for IDS Support
One of the challenges facing system e-government security professionals is the laborious task of sifting through numerous log files in an attempt to identify malicious traffic and...
Christopher Hecker, Brian Hay
IPAW
2010
13 years 5 months ago
Using Data Lineage for Sub-image Processing
In the paper, we show that lineage data collected during the processing and analysis of datasets can be reused to perform selective reprocessing (at sub-image level) on datasets wh...
Johnson Mwebaze, John McFarland, Danny Boxhoorn, H...
TREC
2003
13 years 8 months ago
HARD Experiment at Maryland: From Need Negotiation to Automated HARD Process
Our aim of participating in this year’s High Accuracy Retrieval from Documents (HARD) track is to explore the possibility of developing an automated HARD retrieval model by leve...
Daqing He, Dina Demner-Fushman
BPM
2009
Springer
126views Business» more  BPM 2009»
14 years 3 days ago
An Integrated Collection of Tools for Continuously Improving the Processes by Which Health Care Is Delivered: A Tool Report
This report will present a collection of tools that supports the precise definition, careful analysis, and execution of processes that coordinate the actions of humans, automated d...
Leon J. Osterweil, Lori A. Clarke, George S. Avrun...
GIS
2010
ACM
13 years 2 months ago
Modelling spatial video as part of a GIS video analysis framework
It is now common for video; real-time and collected, mobile and static, to be georeferenced and stored in large archives for users of expert systems to access and interact with. I...
Paul Lewis