Sciweavers

1893 search results - page 284 / 379
» Eliciting and Validating Knowledge in Knowledge Management S...
Sort
View
CSREASAM
2006
13 years 9 months ago
Cryptcoding - Encryption and Error-Correction Coding in a Single Step
In this paper we re-open a 25 years old question of joint encryption and error-correction coding, named here as Cryptcoding. Cryptcoding is a procedure in which encryption/decrypti...
Danilo Gligoroski, Svein J. Knapskog, Suzana Andov...
GROUP
1993
ACM
14 years 7 days ago
ASCW: an assistant for cooperative work
The Assistant for Cooperative Work (ASCW) is a powerful system for the management of distributed work. It consists of the Task Manager, the organizational information system TOSCA...
Thomas Kreifelts, Wolfgang Prinz
ICIP
2006
IEEE
14 years 9 months ago
Multispectral Object Segmentation and Retrieval in Surveillance Video
This paper describes a system for object segmentation and feature extraction for surveillance video. Segmentation is performed by a dynamic vision system that fuses information fr...
Ciarán O. Conaire, Noel E. O'Connor, Eddie ...
ICISS
2009
Springer
14 years 2 months ago
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles
Many peer-assisted content-distribution systems reward a peer based on the amount of data that this peer serves to others. However, validating that a peer did so is, to our knowled...
Michael K. Reiter, Vyas Sekar, Chad Spensky, Zheng...
SPIN
2009
Springer
14 years 2 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...