Sciweavers

1291 search results - page 224 / 259
» Intrusion Detection for Distributed Applications
Sort
View
SIGMOD
2008
ACM
245views Database» more  SIGMOD 2008»
14 years 8 months ago
Information fusion in wireless sensor networks
In wireless sensor networks (WSNs), energy consumption and data quality are two important issues due to limited energy resources and the need for accurate data. In this scenario, i...
Eduardo Freire Nakamura, Antonio Alfredo Ferreira ...
UIC
2009
Springer
14 years 3 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
ANSS
2007
IEEE
14 years 3 months ago
The JMT Simulator for Performance Evaluation of Non-Product-Form Queueing Networks
This paper describes JSIM: the simulation module of the Java Modelling Tools (JMT), an open-source fully-portable Java suite for capacity planning studies. The simulator has been ...
Marco Bertoli, Giuliano Casale, Giuseppe Serazzi
BIBM
2007
IEEE
162views Bioinformatics» more  BIBM 2007»
14 years 3 months ago
Multiple Interacting Subcellular Structure Tracking by Sequential Monte Carlo Method
With the wide application of green fluorescent protein (GFP) in the study of live cells, there is a surging need for the computer-aided analysis on the huge amount of image seque...
Quan Wen, Jean Gao, Kate Luby-Phelps
ICMCS
2007
IEEE
155views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Hidden Maximum Entropy Approach for Visual Concept Modeling
Recently, the bag-of-words approach has been successfully applied to automatic image annotation, object recognition, etc. The method needs to first quantize an image using the vis...
Sheng Gao, Joo-Hwee Lim, Qibin Sun