Sciweavers

198 search results - page 33 / 40
» Combining Fuzzy Information: an Overview
Sort
View
IAT
2007
IEEE
14 years 1 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...
ICMCS
2006
IEEE
210views Multimedia» more  ICMCS 2006»
14 years 1 months ago
3D-TV Content Generation: 2D-to-3D Conversion
The next major advancement in television is expected to be stereoscopic three-dimensional television (3D-TV). A successful roll-out of 3D-TV will require a backwardcompatible tran...
Wa James Tam, Liang Zhang
CHI
2007
ACM
13 years 11 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
WICSA
2008
13 years 8 months ago
Analysis of Architecture Pattern Usage in Legacy System Architecture Documentation
Architecture patterns are an important tool in architectural design. However, while many architecture patterns have been identified, there is little in-depth understanding of thei...
Neil B. Harrison, Paris Avgeriou
ISI
2008
Springer
13 years 7 months ago
Towards service-oriented continuous queries in pervasive systems
Pervasive information systems give an overview of what digital environments should look like in the future. From a data-centric point of view, traditional databases have to be used...
Yann Gripay, Frédérique Laforest, Je...