Sciweavers

10820 search results - page 2059 / 2164
» Understanding the
Sort
View
IJMSO
2007
201views more  IJMSO 2007»
13 years 9 months ago
A context-aware meeting alert using semantic web and rule technology
This paper describes work in progress developing a context-aware meeting alert. This application integrates semantic web technology in RDF (for representing calendars), semantic we...
Grigoris Antoniou, Antonis Bikakis, Anna Karamoleg...
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 9 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
SP
2008
IEEE
120views Security Privacy» more  SP 2008»
13 years 9 months ago
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Abstract--Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includ...
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjami...
SP
2008
IEEE
159views Security Privacy» more  SP 2008»
13 years 9 months ago
Inferring neuronal network connectivity from spike data: A temporal data mining approach
Abstract. Understanding the functioning of a neural system in terms of its underlying circuitry is an important problem in neuroscience. Recent developments in electrophysiology an...
Debprakash Patnaik, P. S. Sastry, K. P. Unnikrishn...
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
13 years 9 months ago
A performance tuning methodology with compiler support
We have developed an environment, based upon robust, existing, open source software, for tuning applications written using MPI, OpenMP or both. The goal of this effort, which inte...
Oscar Hernandez, Barbara M. Chapman, Haoqiang Jin
« Prev « First page 2059 / 2164 Last » Next »