Sciweavers

4555 search results - page 844 / 911
» Informing the Development of Calendar Systems for Domestic U...
Sort
View
WWW
2011
ACM
13 years 5 months ago
Heat-seeking honeypots: design and experience
Many malicious activities on the Web today make use of compromised Web servers, because these servers often have high pageranks and provide free resources. Attackers are therefore...
John P. John, Fang Yu, Yinglian Xie, Arvind Krishn...
JIPS
2010
165views more  JIPS 2010»
13 years 5 months ago
IMTAR: Incremental Mining of General Temporal Association Rules
Nowadays due to the rapid advances in the field of information systems, transactional databases are being updated regularly and/or periodically. The knowledge discovered from these...
Anour F. A. Dafa-Alla, Ho-Sun Shon, Khalid E. K. S...
TIP
2010
176views more  TIP 2010»
13 years 5 months ago
A PDE Formalization of Retinex Theory
In 1964 Edwin H. Land formulated the Retinex theory, the first attempt to simulate and explain how the human visual system perceives color. His theory and an extension, the "r...
Jean-Michel Morel, Ana Belen Petro, Catalina Sbert
BWCCA
2010
13 years 4 months ago
Fast Deployment of Computer Forensics with USBs
As popularity of the Internet continues to grow, it changes the way of computer crime. Number of computer crime increases dramatically in recent years and investigators have been f...
Chung-Huang Yang, Pei-Hua Yen
ECIS
2001
13 years 11 months ago
Data Modelling Languages: An Ontological Study
There are many data modelling languages used in today's information systems engineering environment. Some of the data modelling languages used have a degree of hype surroundi...
Simon K. Milton, Edmund Kazmierczak, Chris Keen