Sciweavers

897 search results - page 16 / 180
» Identity: How to name it, How to find it
Sort
View
COMPSEC
2006
110views more  COMPSEC 2006»
13 years 8 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
ERCIMDL
2004
Springer
112views Education» more  ERCIMDL 2004»
14 years 2 months ago
System Support for Name Authority Control Problem in Digital Libraries: OpenDBLP Approach
In maintaining Digital Libraries, having bibliographic data up-to-date is critical, yet often minor irregularities may cause information isolation. Unlike documents for which vario...
Yoojin Hong, Byung-Won On, Dongwon Lee
COMPSAC
2010
IEEE
13 years 6 months ago
A Consistency Model for Identity Information in Distributed Systems
In distributed IT systems, replication of information is commonly used to strengthen the fault tolerance on a technical level or the autonomy of an organization on a business level...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...
CORR
2004
Springer
86views Education» more  CORR 2004»
13 years 8 months ago
Evolutionary design of photometric systems and its application to Gaia
How do I find the optimal photometric system for a survey? Designing a photometric system to best fulfil a set of scientific goals is a complex task, demanding a compromise betwee...
Coryn A. L. Bailer-Jones
AIRS
2005
Springer
14 years 2 months ago
Finding New News: Novelty Detection in Broadcast News
The automatic detection of novelty, or newness, as part of an information retrieval system would greatly improve a searcher’s experience by presenting “documents” in order of...
Georgina Gaughan, Alan F. Smeaton