Sciweavers

945 search results - page 127 / 189
» Detective Information Flow Analysis for Business Processes
Sort
View
IAT
2008
IEEE
14 years 3 months ago
Intent-Driven Insider Threat Detection in Intelligence Analyses
In intelligence analysis, information plays an important role in solving problems and making decisions. However, an increasing number of malicious behaviors, most of which come fr...
Eugene Santos Jr., Hien Nguyen, Fei Yu, Keum Joo K...
CCS
2008
ACM
13 years 10 months ago
Asynchronous policy evaluation and enforcement
Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions ar...
Matthew Burnside, Angelos D. Keromytis
ISCIS
2009
Springer
14 years 3 months ago
A web-based data source for metabolomics
—With the development of improved and cost-effective technologies, it is now possible to detect thousands of metabolites in biofluids or specific organs, and reliably quantify th...
Ali Cakmak, Arun Dsouza, Richard Hanson, Gultekin ...
OR
2011
Springer
13 years 3 months ago
Modeling an e-government observatory for rural SMEs using UML with RUP
Developing Web-based systems for agriculture and rural development requires the collaboration of experts from different scientific fields and backgrounds. Thus, it is crucial to ...
Sotiris Karetsos, Nikos Manouselis, Constantina Co...
MIR
2010
ACM
191views Multimedia» more  MIR 2010»
14 years 20 days ago
Video retargeting with multi-scale trajectory optimization
Mobile devices are increasingly powerful in media storage and rendering. The prevalent request of decent video browsing on mobile devices is demanding. However, one limitation com...
Yuanning Li, YongHong Tian, Jingjing Yang, Ling-Yu...