Sciweavers

844 search results - page 148 / 169
» The strength of multi-row models
Sort
View
MDM
2004
Springer
113views Communications» more  MDM 2004»
14 years 1 months ago
Meta Data to Support Context Aware Mobile Applications
The greater sophistication and availability of mobile computing devices is enabling the application of computing to new tasks and applications to be experienced in a wide range of...
Dan Chalmers, Naranker Dulay, Morris Sloman
EUROSEC
2010
ACM
14 years 1 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
14 years 1 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas
PG
2003
IEEE
14 years 1 months ago
Dynamic Sculpting and Deformation of Point Set Surfaces
This paper presents a novel paradigm for point set surface editing, which takes advantages of the potential of implicit surfaces, the strength of physics based modeling techniques...
Xiaohu Guo, Hong Qin
HICSS
2002
IEEE
109views Biometrics» more  HICSS 2002»
14 years 1 months ago
Toward an Understanding of Creative Solution Generation
Researchers have sought a better understanding of creativity for more than a century and the resulting investigations have shed a great deal of light on the subject of creativity....
Eric L. Santanen, Robert O. Briggs, Gert-Jan de Vr...