Sciweavers

2549 search results - page 144 / 510
» Toward a complexity theory of information systems developmen...
Sort
View
FC
2009
Springer
135views Cryptology» more  FC 2009»
14 years 2 months ago
Blue versus Red: Towards a Model of Distributed Security Attacks
Abstract. This paper analyzes the threat of distributed attacks by developing a two-sided multiplayer model of security in which attackers aim to deny service and defenders strateg...
Neal Fultz, Jens Grossklags
DGO
2007
124views Education» more  DGO 2007»
13 years 9 months ago
Assessing capability for justice information sharing
Enhanced information sharing among criminal justice agencies is a critical concern and a goal of much IT investment. Understanding agencies’ capabilities to achieve this goal is...
Anthony M. Cresswell, Theresa A. Pardo, Shahidul H...
GW
1999
Springer
157views Biometrics» more  GW 1999»
14 years 11 days ago
The Ecological Approach to Multimodal System Design
Following the ecological approach to visual perception, this paper presents a framework that emphasizes the role of vision on referring actions. In particular, affordances are util...
Antonella De Angeli, Frederic Wolff, Laurent Romar...
BMCBI
2010
129views more  BMCBI 2010»
13 years 8 months ago
Detection of distant evolutionary relationships between protein families using theory of sequence profile-profile comparison
Background: Detection of common evolutionary origin (homology) is a primary means of inferring protein structure and function. At present, comparison of protein families represent...
Mindaugas Margelevicius, Ceslovas Venclovas
ICMCS
2009
IEEE
106views Multimedia» more  ICMCS 2009»
13 years 5 months ago
Modeling and analysis of content identification
Content fingerprinting provides a compact content-based representation of a multimedia document. An important application of fingerprinting is the identification of modified copie...
Avinash L. Varna, Min Wu