Sciweavers

26957 search results - page 99 / 5392
» Information Systems Modernization
Sort
View
CRV
2006
IEEE
128views Robotics» more  CRV 2006»
14 years 1 months ago
Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in Scanned Documents for Digital Image Encryption
Conventional image-oriented cryptographic techniques lack the flexibility needed for content-specific security features such as the concealment of confidential information within ...
Alexander Wong, William Bishop
TIC
2000
Springer
124views System Software» more  TIC 2000»
14 years 27 days ago
Sound and Complete Elimination of Singleton Kinds
Singleton kinds provide an elegant device for expressing type equality information resulting from modern module languages, but they can severely complicate the metatheory of langu...
Karl Crary
EOR
2006
117views more  EOR 2006»
13 years 9 months ago
Heuristics for selecting robust database structures with dynamic query patterns
The success of a company increasingly depends on timely information (internal or external) being available to the right person at the right time for crucial managerial decision-ma...
Andrew N. K. Chen, Paulo B. Goes, Alok Gupta, Jame...
HPCA
2003
IEEE
14 years 9 months ago
Dynamic Data Replication: An Approach to Providing Fault-Tolerant Shared Memory Clusters
A challenging issue in today's server systems is to transparently deal with failures and application-imposed requirements for continuous operation. In this paper we address t...
Rosalia Christodoulopoulou, Reza Azimi, Angelos Bi...
EUROSEC
2010
ACM
14 years 2 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani