Sciweavers

3311 search results - page 648 / 663
» Modeling Relational Data by the Adjacency Model
Sort
View
ACSAC
2008
IEEE
14 years 2 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
BIBE
2008
IEEE
203views Bioinformatics» more  BIBE 2008»
14 years 2 months ago
A study of the parameters affecting minimum detectable activity concentration level of clinical LSO PET scanners
— Recent studies in the field of molecular imaging have demonstrated the need for PET probes capable of imaging very weak activity distributions. Over this range of applications ...
Nicolas A. Karakatsanis, Konstantina S. Nikita
HPDC
2008
IEEE
14 years 2 months ago
Ontological framework for a free-form query based grid search engine
If the model of free-form queries, which has proved successful for HTML based search on the Web, is made available for Grid services, it will serve as a powerful tool for scientis...
Chaitali Gupta, Rajdeep Bhowmik, Madhusudhan Govin...
ICRA
2008
IEEE
127views Robotics» more  ICRA 2008»
14 years 2 months ago
New framework for Simultaneous Localization and Mapping: Multi map SLAM
—The main contribution of this paper arises from the development of a new framework, which has its inspiration in the mechanics of human navigation, for solving the problem of Si...
Damith Chandana Herath, Sarath Kodagoda, Gamini Di...
ANSS
2007
IEEE
14 years 2 months ago
Vehicular Mobility Simulation for VANETs
During the last few years, continuous progresses in wireless communications have opened new research fields in computer networking, aimed at extending data networks connectivity ...
Marco Fiore, Jérôme Härri, Fethi...