Sciweavers

2446 search results - page 345 / 490
» Principles of dataspace systems
Sort
View
ACSAC
2005
IEEE
14 years 3 months ago
User-Centered Security: Stepping Up to the Grand Challenge
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Mary Ellen Zurko
ICCV
2005
IEEE
14 years 3 months ago
Visual Speech Recognition with Loosely Synchronized Feature Streams
We present an approach to detecting and recognizing spoken isolated phrases based solely on visual input. We adopt an architecture that first employs discriminative detection of ...
Kate Saenko, Karen Livescu, Michael Siracusa, Kevi...
ISDA
2005
IEEE
14 years 3 months ago
Smart Archive: a Component-based Data Mining Application Framework
Implementation of data mining applications is a challenging and complicated task, and the applications are often built from scratch. In this paper, a component-based application f...
Perttu Laurinen, Lauri Tuovinen, Juha Röning
NDSS
2005
IEEE
14 years 3 months ago
MOVE: An End-to-End Solution to Network Denial of Service
We present a solution to the denial of service (DoS) problem that does not rely on network infrastructure support, conforming to the end-to-end (e2e) design principle. Our approac...
Angelos Stavrou, Angelos D. Keromytis, Jason Nieh,...
ATAL
2005
Springer
14 years 3 months ago
Multi-agent concepts as basis for dynamic plug-in software architectures
In this work we present the basic concepts for a dynamic plug-in-based software architecture using concepts from the Petri net-based MAS framework Mulan. By transferring the conce...
Lawrence Cabac, Michael Duvigneau, Daniel Moldt, H...