Sciweavers

3451 search results - page 602 / 691
» Collaborative attack modeling
Sort
View
CHIMIT
2009
ACM
14 years 2 months ago
Scripting practices in complex systems management
System administrators are end-users too. And as end-users, they develop tools, create web pages, write command-line scripts, use spreadsheets, and repurpose existing tools. In sho...
Eser Kandogan, Paul P. Maglio, Eben M. Haber, John...
MM
2009
ACM
230views Multimedia» more  MM 2009»
14 years 2 months ago
Query expansion for hash-based image object retrieval
An efficient indexing method is essential for content-based image retrieval with the exponential growth in large-scale videos and photos. Recently, hash-based methods (e.g., local...
Yin-Hsi Kuo, Kuan-Ting Chen, Chien-Hsing Chiang, W...
HICSS
2008
IEEE
222views Biometrics» more  HICSS 2008»
14 years 2 months ago
Service Oriented Architecture: Challenges for Business and Academia
Today, the means for attaining competitive advantage with information technology (IT) has shifted from efficiently managing the organization's operations to discovering ways ...
Amelia Maurizio, James Sager, Peter Jones, Gail Co...
ICALT
2008
IEEE
14 years 2 months ago
LEMAT: A Project for Innovation in Teaching Mathematics
“Lemat” is an acronym for Libro Electrónico de Matemáticas, which means Electronic Book of Mathematics. It is a project developed by a group of teachers at secondary school ...
Beatriz Porras, Jose A. Cordon, Juan Manuel Olazab...
ICDCS
2008
IEEE
14 years 2 months ago
Mobility-Assisted Spatiotemporal Detection in Wireless Sensor Networks
Wireless sensor networks (WSNs) deployed for missioncritical applications face the fundamental challenge of meeting stringent spatiotemporal performance requirements using nodes w...
Guoliang Xing, Jianping Wang, Ke Shen, Qingfeng Hu...