Sciweavers

2414 search results - page 186 / 483
» Computing Normal Subgroups
Sort
View
LCN
1999
IEEE
14 years 1 months ago
An Integrated Software Immune System: A Framework for Automated Network Management, System Health, and Security
Maintaining the integrity of large-scale networks is becoming an increasingly daunting task as networks expand at an unprecedented rate. The majority of present network monitoring...
Michael Gilfix
CHI
1994
ACM
14 years 1 months ago
Towards the interactive office
We describe a prototype system, the Interactive Office, which supports the occupant's daily activities in an office. Discrete sensors embedded in an office detect the occupan...
Steve Hodges, Gifford Louie
ICPR
2010
IEEE
14 years 16 days ago
Transition Thresholds for Binarization of Historical Documents
Abstract--This paper extends the transition method for binarization based on transition pixels, a generalization of edge pixels. This method originally computes transition threshol...
Marte Alejandro Ramírez-Ortegón, Raul Rojas
ACSW
2006
13 years 10 months ago
Description of bad-signatures for network intrusion detection
Today, a computer network is under constant assault from attacks. In Computer Science, NIDS are used in order to protect a computer network against these intrusions. These systems...
Michael Hilker, Christoph Schommer
CG
2008
Springer
13 years 9 months ago
Images of a vibrating Koch drum
We illustrate the vibrational modes of a drum shaped like the Koch snowflake. Vibrational modes are computed using a fairly standard finite difference technique applied to a recen...
Mark McClure