Sciweavers

6762 search results - page 1180 / 1353
» Multiple drafts model
Sort
View
COMPSEC
2002
185views more  COMPSEC 2002»
13 years 8 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
SIAMAM
2000
131views more  SIAMAM 2000»
13 years 8 months ago
The Description of Homogeneous Branched-Chain Explosions with Slow Radical Recombination by Self-Adjusting Time Scales
A nonlinear multiscale technique is used to describe the time history of a spatially homogeneous chain-branching/chain-breaking explosion when chain branching is much faster than c...
Antonio L. Sanchez, Luis L. Bonilla, Manuel Carret...
IJCIA
2002
137views more  IJCIA 2002»
13 years 8 months ago
Co-Evolution in Social Interactions
An interesting problem which has been widely investigated is under what circumstances will a society of rational agents realize some particular stable situations, and whether they ...
Hiroshi Sato, Akira Namatame
DPD
1998
141views more  DPD 1998»
13 years 8 months ago
Dynamic Query Operator Scheduling for Wide-Area Remote Access
Distributed databases operating over wide-area networks such as the Internet, must deal with the unpredictable nature of the performance of communication. The response times of acc...
Laurent Amsaleg, Michael J. Franklin, Anthony Toma...
IJCV
1998
135views more  IJCV 1998»
13 years 8 months ago
A Multibody Factorization Method for Independently Moving Objects
The structure-from-motion problem has been extensively studied in the field of computer vision. Yet, the bulk of the existing work assumes that the scene contains only a single mo...
João Paulo Costeira, Takeo Kanade
« Prev « First page 1180 / 1353 Last » Next »