Sciweavers

319 search results - page 50 / 64
» Defining Requirements for an Incident Management System: A C...
Sort
View
ICDE
2008
IEEE
232views Database» more  ICDE 2008»
14 years 9 months ago
Continuous Content-Based Copy Detection over Streaming Videos
Digital videos are increasingly adopted in various multimedia applications where they are usually broadcasted or transmitted as video streams. Continuously monitoring copies on the...
Ying Yan, Beng Chin Ooi, Aoying Zhou
ACSAC
2003
IEEE
14 years 28 days ago
MLS-PCA: A High Assurance Security Architecture for Future Avionics
1 DOD Joint Vision 2020 (JV2020) is the integrated multi-service planning document for conduct among coalition forces of future warfare. It requires the confluence of a number of k...
Clark Weissman
WETICE
2002
IEEE
14 years 16 days ago
On Communication Security in Wireless Ad-Hoc Sensor Networks
Networks of wireless microsensors for monitoring physical environments have emerged as an important new application area for the wireless technology. Key attributes of these new t...
Sasha Slijepcevic, Miodrag Potkonjak, Vlasios Tsia...
CIKM
2004
Springer
13 years 11 months ago
InfoAnalyzer: a computer-aided tool for building enterprise taxonomies
In this paper we study the problem of collecting training samples for building enterprise taxonomies. We develop a computer-aided tool named InfoAnalyzer, which can effectively as...
Li Zhang, Shixia Liu, Yue Pan, Liping Yang
CACM
1998
103views more  CACM 1998»
13 years 7 months ago
The Virtual Design Team
The long range goal of the “Virtual Design Team” (VDT) research program is to develop computational tools to analyze decision making and communication behavior and thereby to ...
John C. Kunz, Tore R. Christiansen, Geoff P. Cohen...