Sciweavers

236 search results - page 23 / 48
» Product action
Sort
View
CNSR
2008
IEEE
126views Communications» more  CNSR 2008»
14 years 3 months ago
Distributed Exchange of Alerts for the Detection of Coordinated Attacks
Attacks and intrusions to information systems cause large revenue losses. The prevention of these attacks is not always possible by just considering information from isolated sour...
Joaquín García-Alfaro, Michael A. Ja...
HICSS
2008
IEEE
137views Biometrics» more  HICSS 2008»
14 years 3 months ago
Marketing Using Web 2.0
The increasing popularity of Web 2.0 tools, such as blogs, wikis, and virtual worlds, is fundamentally changing how consumers use the Web. The basic core of Web 2.0, that users ca...
Salvatore Parise, Patricia J. Guinan
INCDM
2007
Springer
69views Data Mining» more  INCDM 2007»
14 years 2 months ago
Simultaneous Co-clustering and Modeling of Market Data
For difficult prediction problems, practitioners often segment the data into relatively homogenous groups and then build a model for each group. This two-step procedure usually res...
Meghana Deodhar, Joydeep Ghosh
ICRA
2006
IEEE
127views Robotics» more  ICRA 2006»
14 years 2 months ago
Controlling three Dimensional Swarms of Robots
— We address the problem of modeling and controlling a swarm of fully actuated point-like robots in three dimensions by generalizing the planar framework from [1]. We define a e...
Nathan Michael, Calin Belta, Vijay Kumar
IWIA
2006
IEEE
14 years 2 months ago
High Robustness Requirements in a Common Criteria Protection Profile
The development of a Common Criteria protection profile for high-robustness separation kernels requires explicit modifications of several Common Criteria requirements as well as e...
Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvin...