Sciweavers

823 search results - page 132 / 165
» The Participatory Paradigm for Applied Information Systems R...
Sort
View
DICTA
2008
13 years 10 months ago
Digital Image Retrieval Using Intermediate Semantic Features and Multistep Search
Recently, semantic image retrieval has attracted large amount of interest due to the rapid growth of digital image storage. However, existing approaches have severe limitations. I...
Dengsheng Zhang, Ying Liu, Jin Hou
ACSW
2006
13 years 10 months ago
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS
Intrusion detection systems (IDS) perform an important role in the provision of network security, providing real- time notification of attacks in progress. One promising category ...
David Duncombe, George M. Mohay, Andrew Clark
EUROSYS
2008
ACM
14 years 6 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
HICSS
2003
IEEE
182views Biometrics» more  HICSS 2003»
14 years 2 months ago
Business Intelligence Explorer: A Knowledge Map Framework for Discovering Business Intelligence on the Web
Nowadays, information overload hinders the discovery of business intelligence on the World Wide Web. Existing business intelligence tools suffer from a lack of analysis and visual...
Wingyan Chung, Hsinchun Chen, Jay F. Nunamaker
DSS
2002
139views more  DSS 2002»
13 years 9 months ago
CI Spider: a tool for competitive intelligence on the Web
Competitive Intelligence (CI) aims to monitor a firm's external environment for information relevant to its decision-making process. As an excellent information source, the I...
Hsinchun Chen, Michael Chau, Daniel Dajun Zeng