Sciweavers

1281 search results - page 232 / 257
» BASIS: A Biological Approach to System Information Security
Sort
View
DRM
2005
Springer
14 years 2 months ago
Watermarking and ownership problem: a revisit
Watermarking technologies have been envisioned as a potential means for establishing ownership on digital media objects. However, achievable robustness and false-positive rates of...
Husrev T. Sencar, Nasir D. Memon
ICDCS
2002
IEEE
14 years 1 months ago
A Fully Distributed Framework for Cost-Sensitive Data Mining
Data mining systems aim to discover patterns and extract useful information from facts recorded in databases. A widely adopted approach is to apply machine learning algorithms to ...
Wei Fan, Haixun Wang, Philip S. Yu, Salvatore J. S...
DAIS
2003
13 years 10 months ago
DataWarp: Building Applications Which Make Progress in an Inconsistent World
Some of the data available to today’s enterprise applications is inconsistent. This is an inevitable consequence of data being distributed and partially replicated in many locati...
Peter Henderson, Robert John Walters, Stephen Crou...
RV
2007
Springer
151views Hardware» more  RV 2007»
14 years 2 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
COLCOM
2008
IEEE
14 years 3 months ago
Access Control Model for Sharing Composite Electronic Health Records
The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of...
Jing Jin, Gail-Joon Ahn, Michael J. Covington, Xin...