Sciweavers

250 search results - page 41 / 50
» Lost source provenance
Sort
View
SPRINGSIM
2007
13 years 8 months ago
Bringing knowledge to network defense
Security managers must scan through multiple continuous data streams issuing from diverse sources in an effort to defend computer networks from attack. However, manual aggregation...
Leigh Flagg, Gordon Streeter, Andrew Potter
CONCURRENCY
2007
98views more  CONCURRENCY 2007»
13 years 7 months ago
Portal-based Knowledge Environment for Collaborative Science
The Knowledge Environment for Collaborative Science (KnECS) is an open source informatics toolkit designed to enable knowledge grids that interconnect science communities, unique ...
Karen Schuchardt, Carmen M. Pancerella, Larry A. R...
ET
2008
92views more  ET 2008»
13 years 7 months ago
Hardware and Software Transparency in the Protection of Programs Against SEUs and SETs
Processor cores embedded in systems-on-a-chip (SoCs) are often deployed in critical computations, and when affected by faults they may produce dramatic effects. When hardware harde...
Eduardo Luis Rhod, Carlos Arthur Lang Lisbôa...
ICASSP
2010
IEEE
13 years 6 months ago
Flexible complex ICA of fMRI data
Data-driven analysis methods, in particular independent component analysis (ICA) has proven quite useful for the analysis of functional magnetic imaging (fMRI) data. In addition, ...
Hualiang Li, Tülay Adali, Nicolle M. Correa, ...
CLOUDCOM
2010
Springer
13 years 5 months ago
A Token-Based Access Control System for RDF Data in the Clouds
The Semantic Web is gaining immense popularity-and with it, the Resource Description Framework (RDF) broadly used to model Semantic Web content. However, access control on RDF sto...
Arindam Khaled, Mohammad Farhan Husain, Latifur Kh...