Sciweavers

7961 search results - page 1355 / 1593
» Data Integration with Uncertainty
Sort
View
ISI
2005
Springer
14 years 4 months ago
Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites
Abstract. The Internet which has enabled global businesses to flourish has become the very same channel for mushrooming ‘terrorist news networks.’ Terrorist organizations and t...
Edna Reid, Jialun Qin, Yilu Zhou, Guanpi Lai, Marc...
ISPA
2005
Springer
14 years 4 months ago
Next Generation Networks Architecture and Layered End-to-End QoS Control
Next-generation network (NGN) is a new concept and becoming more and more important for future telecommunication networks. This paper illustrates five function layers of NGN archit...
Weijia Jia, Bo Han, Ji Shen, Haohuan Fu
IWDW
2005
Springer
14 years 4 months ago
ViWiD : Visible Watermarking Based Defense Against Phishing
In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks - a form of web based identity theft. ViWiD is an integrity check m...
Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, ...
LSSC
2005
Springer
14 years 4 months ago
Systolic Architecture for Adaptive Censoring CFAR PI Detector
A new parallel algorithm for signal processing and a parallel systolic architecture of a robust constant false alarm rate (CFAR) processor with post-detection integration and adap...
Ivan Garvanov, Christo A. Kabakchiev, Plamen Daska...
NLDB
2005
Springer
14 years 4 months ago
Combining Biological Databases and Text Mining to Support New Bioinformatics Applications
Abstract. A large amount of biological knowledge today is only available from full-text research papers. Since neither manual database curators nor users can keep up with the rapid...
René Witte, Christopher J. O. Baker
« Prev « First page 1355 / 1593 Last » Next »