Sciweavers

5344 search results - page 1063 / 1069
» Privacy-Preserving Set Operations
Sort
View
TISSEC
2010
119views more  TISSEC 2010»
13 years 4 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...
TMI
2010
208views more  TMI 2010»
13 years 4 months ago
Patient-Specific Modeling and Quantification of the Aortic and Mitral Valves From 4-D Cardiac CT and TEE
As decisions in cardiology increasingly rely on non-invasive methods, fast and precise image processing tools have become a crucial component of the analysis workflow. To the best ...
Razvan Ioan Ionasec, Ingmar Voigt, Bogdan Georgesc...
TON
2010
159views more  TON 2010»
13 years 4 months ago
Googling the internet: profiling internet endpoints via the world wide web
Understanding Internet access trends at a global scale, i.e., how people use the Internet, is a challenging problem that is typically addressed by analyzing network traces. However...
Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuz...
TR
2010
140views Hardware» more  TR 2010»
13 years 4 months ago
Modeling Failure Modes for Residual Life Prediction Using Stochastic Filtering Theory
This paper reports on a theoretical Bayesian modeling development for residual life prediction in the context of condition-based maintenance. At each monitoring point during a comp...
Matthew J. Carr, Wenbin Wang
TSMC
2010
13 years 4 months ago
Extending the Adaptability of Reference Models
Reference models are an important aid for business process modeling and design. Their aim is to capture domain knowledge and assist in the design of enterprise specific business pr...
Iris Reinhartz-Berger, Pnina Soffer, Arnon Sturm
« Prev « First page 1063 / 1069 Last » Next »