Sciweavers

6137 search results - page 1216 / 1228
» Securing Collaborative Applications
Sort
View
APCCM
2006
13 years 10 months ago
Network data mining: methods and techniques for discovering deep linkage between attributes
Network Data Mining identifies emergent networks between myriads of individual data items and utilises special algorithms that aid visualisation of `emergent' patterns and tre...
John Galloway, Simeon J. Simoff
CASCON
2006
131views Education» more  CASCON 2006»
13 years 10 months ago
STAC: software tuning panels for autonomic control
One aspect of autonomic computing is the ability to identify, separate and automatically tune parameters related to performance, security, robustness and other properties of a sof...
Elizabeth Dancy, James R. Cordy
EVOTING
2004
100views Hardware» more  EVOTING 2004»
13 years 10 months ago
E-Democracy in E-Austria
Abstract: Christian Rupp has been appointed Federal Executive Secretary of EGovernment in May of 2003. At that point of time a new E-Government Platform was introduced. He reports ...
Christian Rupp
DMIN
2006
111views Data Mining» more  DMIN 2006»
13 years 10 months ago
Profiling and Clustering Internet Hosts
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...
Songjie Wei, Jelena Mirkovic, Ezra Kissel
SSWMC
2004
13 years 10 months ago
A hybrid scheme for encryption and watermarking
Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encr...
Xiaowei Xu, Scott D. Dexter, Ahmet M. Eskicioglu
« Prev « First page 1216 / 1228 Last » Next »