Sciweavers

7587 search results - page 1372 / 1518
» Network Analysis and Visualisation
Sort
View
GLOBECOM
2009
IEEE
13 years 12 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
13 years 12 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...
AMT
2006
Springer
107views Multimedia» more  AMT 2006»
13 years 11 months ago
An Intelligent Process Monitoring System in Complex Manufacturing Environment
In high-tech industries, most manufacturing processes are complexly intertwined, in that manufacturers or engineers can hardly control a whole set of processes. They are only capa...
Sung Ho Ha, Boo-Sik Kang
BIBE
2004
IEEE
13 years 11 months ago
Identifying the Combination of Genetic Factors that Determine Susceptibility to Cervical Cancer
Cervical cancer is common among women all over the world. Although infection with high-risk types of human papillomavirus (HPV) has been identified as the primary cause of cervical...
Jorng-Tzong Horng, Kai-Chih Hu, Li-Cheng Wu, Hsien...
CCS
2006
ACM
13 years 11 months ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
« Prev « First page 1372 / 1518 Last » Next »