Sciweavers

536 search results - page 37 / 108
» Embedding Information Security into the Organization
Sort
View
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
14 years 2 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
AWIC
2003
Springer
14 years 1 months ago
Using Case-Based Reasoning to Improve Information Retrieval in Knowledge Management Systems
Abstract. Complementary to hypertext navigation, classic information retrieval is broadly used to find information on the World Wide Web and on Web-based systems. Among these there...
Norbert Gronau, Frank Laskowski
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
14 years 2 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
PVLDB
2010
184views more  PVLDB 2010»
13 years 6 months ago
TimeTrails: A System for Exploring Spatio-Temporal Information in Documents
Spatial and temporal data have become ubiquitous in many application domains such as the Geosciences or life sciences. Sophisticated database management systems are employed to ma...
Jannik Strötgen, Michael Gertz
KDD
2008
ACM
224views Data Mining» more  KDD 2008»
14 years 8 months ago
The structure of information pathways in a social communication network
Social networks are of interest to researchers in part because they are thought to mediate the flow of information in communities and organizations. Here we study the temporal dyn...
Gueorgi Kossinets, Jon M. Kleinberg, Duncan J. Wat...