Sciweavers

2316 search results - page 425 / 464
» The many forms of hypercomputation
Sort
View
DAGSTUHL
2006
15 years 5 months ago
Cognitive Vision Needs Attention to Link Sensing with Recognition
Abstract. "Cognitive computer vision is concerned with integration and control of vision systems using explicit but not necessarily symbolic models of context, situation and g...
John K. Tsotsos
IADIS
2004
15 years 5 months ago
End to End Defence Against DDoS Atacks
Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks accounted for more losses than Internet financial fraud and viruses combined (CSI/FBI 2003). The I...
Anastasia Gemona, Ishbel Duncan, Colin Allison, Al...
ICETE
2004
204views Business» more  ICETE 2004»
15 years 5 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
AUSFORENSICS
2003
15 years 5 months ago
Computer Forensics in the Global Enterprise
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
Melisa Bleasdale, Scott Mann, John Patzakis
EUNIS
2001
15 years 5 months ago
The influence of the Information System on administrative processes at the University of Latvia
: The goal of this paper is to describe how the development, implementation, and deployment of Information System of University of Latvia changed the life of the University and fac...
Janis Stonis, Laila Niedrite, Aivars Niedritis