Sciweavers

124 search results - page 10 / 25
» Progressive Bridge Identification
Sort
View
AUSFORENSICS
2003
13 years 9 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver
CIMCA
2008
IEEE
14 years 2 months ago
Usability-Focused Architectural Design for Graphical User Interface Components
Although in recent years some progress in software engineering (SE) and human-computer interaction (HCI) has been made, there is still a gap between the two research areas and the...
Stephan Bode, Matthias Riebisch
DSN
2008
IEEE
14 years 2 months ago
Byzantine replication under attack
Existing Byzantine-resilient replication protocols satisfy two standard correctness criteria, safety and liveness, in the presence of Byzantine faults. In practice, however, fault...
Yair Amir, Brian A. Coan, Jonathan Kirsch, John La...
MLMI
2007
Springer
14 years 2 months ago
An Ego-Centric and Tangible Approach to Meeting Indexing and Browsing
Abstract. This article presents an ego-centric approach for indexing and browsing meetings. The method considers two concepts: meetings’ data alignment with personal information ...
Denis Lalanne, Florian Evéquoz, Maurizio Ri...
WACV
2005
IEEE
14 years 2 months ago
Dental Biometrics: Alignment and Matching of Dental Radiographs
—Dental biometrics utilizes dental radiographs for human identification. The dental radiographs provide information about teeth, including tooth contours, relative positions of n...
Hong Chen, Anil K. Jain