Sciweavers

1296 search results - page 226 / 260
» Multiplicative Background Risk
Sort
View
VIZSEC
2005
Springer
14 years 3 months ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...
NETGAMES
2004
ACM
14 years 3 months ago
Lightweight QoS-support for networked mobile gaming
In this paper, we present an approach to provide Quality of Service (QoS) for networked mobile gaming. In order to examine the QoS requirements of mobile games, we ported a simple...
Marcel Busse, Bernd Lamparter, Martin Mauve, Wolfg...
ICDAR
2003
IEEE
14 years 3 months ago
Progress in Camera-Based Document Image Analysis
The increasing availability of high performance, low priced, portable digital imaging devices has created a tremendous opportunity for supplementing traditional scanning for docum...
David S. Doermann, Jian Liang, Huiping Li
WSE
2002
IEEE
14 years 2 months ago
Laying the Foundation for Web Services over Legacy Systems
As the use of the World Wide Web becomes more pervasive within our society, businesses and institutions are required to migrate a wide range of services to the web. Difficulties a...
Janet Lavery, Cornelia Boldyreff, Bin Ling, Colin ...
ERCIMDL
1998
Springer
183views Education» more  ERCIMDL 1998»
14 years 2 months ago
The Alexandria Digital Library Architecture
Abstract. Since 1994, the Alexandria Digital Library Project has developed three prototype digital libraries for georeferenced information. This paper describes the most recent of ...
James Frew, Michael Freeston, Nathan Freitas, Lind...