Sciweavers

46 search results - page 7 / 10
» The Relationship between Architectures and Example-Retrieval...
Sort
View
143
Voted
GI
2009
Springer
15 years 1 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
130
Voted
IDEAL
2005
Springer
15 years 9 months ago
Patterns in Complex Systems Modeling
The design, development, and use of complex systems models raises a unique class of challenges and potential pitfalls, many of which are commonly recurring problems. Over time, res...
Janet Wiles, James Watson
173
Voted
WMASH
2003
ACM
15 years 9 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
114
Voted
JUCS
2010
139views more  JUCS 2010»
15 years 2 months ago
Gabor Filter Aided 3D Ultra-Sonography Diagnosis System with WLAN Transmission Consideration
: The Gabor filter aided diagnosis system for 3-dimensional ultra-sonography (3DUS) under the WLAN environment is introduced. Due to the important relationship between breast tumou...
Wei-Ming Chen, Chi-Hsiang Lo, Han-Chieh Chao, Chun...
119
Voted
IJCAI
1989
15 years 4 months ago
A Model for Projection and Action
In designing autonomous agents that deal competently with issues involving time and space, there is a tradeoff to be made between guaranteed response-time reactions on the one han...
Keiji Kanazawa, Thomas Dean