Sciweavers

2162 search results - page 60 / 433
» E-Crime Investigative Technologies
Sort
View
JAPLL
2010
98views more  JAPLL 2010»
13 years 7 months ago
Formalization of the ad hominem argumentation scheme
In this paper, several examples from the literature, and one central new one, are used as case studies of texts of discourse containing an argumentation scheme that has now been w...
Douglas Walton
WWW
2001
ACM
14 years 9 months ago
Geospatial mapping and navigation of the web
Web pages may be organized, indexed, searched, and navigated along several different feature dimensions. We investigate different approaches to discovering geographic context for ...
Kevin S. McCurley
COST
2007
Springer
95views Multimedia» more  COST 2007»
14 years 2 months ago
On the Use of NonVerbal Speech Sounds in Human Communication
Recent work investigating the interaction of the speech signal with the meaning of the verbal content has revealed interactions not yet modelled in either speech recognition techn...
Nick Campbell
SAINT
2003
IEEE
14 years 2 months ago
On Ubiquitous Network Security and Anomaly Detection
As networking trends move toward ubiquitous structuring schemes, the problem of security has taken on an increasingly important role. As a result, we must look to new security par...
Colin Van Dyke, Çetin Kaya Koç
WISE
2000
Springer
14 years 1 months ago
A Whole Correlation Structure of Asymptotically Self-Similar Traffic in Communication Networks
A closed form of autocorrelation functions about asymptotically self-similar processes is presented. The verification shows that this form best the realtrajfic data on Ethernet in...
Ming Li, Weijia Jia, Wei Zhao