Sciweavers

2635 search results - page 452 / 527
» System Area Network Mapping
Sort
View
ISI
2006
Springer
13 years 9 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
RAS
2000
161views more  RAS 2000»
13 years 9 months ago
Active object recognition by view integration and reinforcement learning
A mobile agent with the task to classify its sensor pattern has to cope with ambiguous information. Active recognition of three-dimensional objects involves the observer in a sear...
Lucas Paletta, Axel Pinz
SAC
2002
ACM
13 years 8 months ago
HTTP redirection for replica catalogue lookups in data grids
1 Data distribution and replication in distributed systems require special purpose middleware tools for accessing replicated data. Data Grids, special forms of a systems distribute...
Heinz Stockinger, Andrew Hanushevsky
TNN
2010
227views Management» more  TNN 2010»
13 years 3 months ago
Self-Organizing MultiLayer Perceptron
Abstract--A set of Artificial Neural Network (ANN) based methods for the design of an effective system of speech recognition of numerals of Assamese language captured under varied ...
B. Gas
ESORICS
2012
Springer
11 years 11 months ago
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle
Although recent compromises and admissions have given new credibility to claimed encounters of Man-in-the-middle (MitM) attacks on SSL/TLS, very little proof exists in the public r...
Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Ge...