Sciweavers

1056 search results - page 151 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
JASIS
2007
101views more  JASIS 2007»
13 years 8 months ago
Mining Web functional dependencies for flexible information access
We present an approach to enhancing information access through web structure mining in contrast to traditional approaches involving usage mining. Specifically, we mine the hardwi...
Saverio Perugini, Naren Ramakrishnan
JCP
2007
132views more  JCP 2007»
13 years 8 months ago
A Theoretical Framework for Organizational Network Forensic Readiness
This paper discusses breaking the escalation cycle that locks cyber intruders and their targets in a state where targets are perennially resigned to attacks and intruders are at...
Barbara Endicott-Popovsky, Deborah A. Frincke, Car...
TOIT
2008
92views more  TOIT 2008»
13 years 8 months ago
Security and identification indicators for browsers against spoofing and phishing attacks
In spite of the use of standard web security measures (SSL/TLS), users enter sensitive information such as passwords into scam web sites. Such scam sites cause substantial damages...
Amir Herzberg, Ahmad Jbara
TON
2008
159views more  TON 2008»
13 years 8 months ago
Optimizing lifetime for continuous data aggregation with precision guarantees in wireless sensor networks
This paper exploits the tradeoff between data quality and energy consumption to extend the lifetime of wireless sensor networks. To obtain an aggregate form of sensor data with pre...
Xueyan Tang, Jianliang Xu
JMM2
2007
117views more  JMM2 2007»
13 years 8 months ago
Image Segmentation using Multi-Coloured Active Illumination
— In this paper, the use of active illumination is extended to image segmentation, specifically in the case of overlapping particles. This work is based on Multi-Flash Imaging (M...
Tze Ki Koh, Nicholas Miles, Steve Morgan, Barrie H...