Sciweavers

1663 search results - page 149 / 333
» Computer Security in the Real World
Sort
View
130
Voted
EUROSSC
2008
Springer
15 years 4 months ago
Exploring the Design of Pay-Per-Use Objects in the Construction Domain
Equipment used in the construction domain is often hired in order to reduce cost and maintenance overhead. The cost of hire is dependent on the time period involved and does not ta...
Daniel Fitton, Vasughi Sundramoorthy, Gerd Kortuem...
145
Voted
ICDM
2010
IEEE
217views Data Mining» more  ICDM 2010»
15 years 1 months ago
Discovering Temporal Features and Relations of Activity Patterns
An important problem that arises during the data mining process in many new emerging application domains is mining data with temporal dependencies. One such application domain is a...
Ehsan Nazerfard, Parisa Rashidi, Diane J. Cook
159
Voted
ICPR
2008
IEEE
15 years 10 months ago
Multimodal biometrics management using adaptive score-level combination
This paper presents a new evolutionary approach for adaptive combination of multiple biometrics to dynamically ensure the performance for the desired level of security. The adapti...
Ajay Kumar, Vivek Kanhangad, David Zhang
124
Voted
EUROMICRO
2004
IEEE
15 years 7 months ago
Intrusion Detection in Virtual Machine Environments
A virtual machine is a software replica of an underlying real machine. Multiple virtual machines can operate on the same host machine concurrently, without interfere each other. S...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
161
Voted
SIGMOD
2004
ACM
154views Database» more  SIGMOD 2004»
16 years 3 months ago
Compressing Historical Information in Sensor Networks
We are inevitably moving into a realm where small and inexpensive wireless devices would be seamlessly embedded in the physical world and form a wireless sensor network in order t...
Antonios Deligiannakis, Yannis Kotidis, Nick Rouss...