Sciweavers

1302 search results - page 98 / 261
» Focus on Components
Sort
View
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 9 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
112
Voted
DEXAW
2009
IEEE
129views Database» more  DEXAW 2009»
15 years 9 months ago
Pattern-Based Approach for Logical Traffic Isolation Forensic Modelling
— The use of design patterns usually changes the approach of software design and makes software development relatively easy. This paper extends work on a forensic model for Logic...
Innocentia Dlamini, Martin Olivier, Sihle Sibiya
106
Voted
CANDC
2009
ACM
15 years 9 months ago
RiTa: creativity support for computational literature
The RiTa Toolkit for Computation Literature is a suite of open-source components, tutorials, and examples, providing support for a range of tasks related to the practice of creati...
Daniel C. Howe
150
Voted
VRCAI
2009
ACM
15 years 9 months ago
Segmentation of architecture shape information from 3D point cloud
Object Segmentation is an important step in object reconstruction from point cloud data of complex urban scenes and in applications to virtual environment. This paper focuses on s...
Xiaojuan Ning, Xiaopeng Zhang, Yinghui Wang, Marc ...
113
Voted
ICRA
2008
IEEE
201views Robotics» more  ICRA 2008»
15 years 9 months ago
Hierarchical distributed control for search and tracking by heterogeneous aerial robot networks
Abstract—This paper presents a hierarchical control architecture that enables cooperative surveillance by a heterogeneous aerial robot network comprised of mothership unmanned ai...
Jack Elston, Eric W. Frew