Sciweavers

4419 search results - page 113 / 884
» Information Science in Transition
Sort
View
128
Voted
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
15 years 10 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich
GI
2007
Springer
15 years 9 months ago
A New Approach for Estimating Depth by Fusing Stereo and Defocus Information
: Several algorithms are common for estimating depth from stereo series, but many of them have difficulties when determining depth of objects having periodical structure. This con...
Ioana Gheta, Christian Frese, Michael Heizmann, J&...
109
Voted
GI
2007
Springer
15 years 9 months ago
EgoIR: Ontology-based Information Retrieval Intended for eGovernment
: The eGovernment is a field of applications for the Semantic Web. The eGovernment also is becoming an important research area and faces considerable challenges to achieve interope...
Fernando Ortiz-Rodríguez, Raúl Palma...
114
Voted
FOCS
2002
IEEE
15 years 8 months ago
Global Information from Local Observation
We observe a certain random process on a graph ”locally”, i.e., in the neighborhood of a node, and would like to derive information about ”global” properties of the graph....
Itai Benjamini, László Lovász
120
Voted
ERSHOV
2006
Springer
15 years 7 months ago
Information-Flow Attacks Based on Limited Observations
Abstract. Two formal models for description of timing attacks are presented, studied and compared with other security concepts. The models are based on a timed process algebra and ...
Damas P. Gruska