Sciweavers

1737 search results - page 267 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
153
Voted
TSMC
2010
14 years 9 months ago
Can You See Me Now? Sensor Positioning for Automated and Persistent Surveillance
Most existing camera placement algorithms focus on coverage and/or visibility analysis, which ensures that the object of interest is visible in the camera's field of view (FOV...
Yi Yao, Chung-Hao Chen, Besma R. Abidi, David L. P...
DIGRA
2005
Springer
15 years 8 months ago
A Sociotechnical Conjecture about the Context and Development of Multiplayer Online Game Experiences
The advent of multiplayer online games brings new actors into the development scene and redefines traditional roles and interactions. Anchored on studies of the role of context in...
Licinio Roque
INFOCOM
2009
IEEE
15 years 9 months ago
Minimizing the Cost of Mine Selection Via Sensor Networks
— In this paper, we study sensor enabled landmine networks by formulating a minimum-cost mine selection problem. The problem arises in a target defence scenario, where the object...
Changlei Liu, Guohong Cao
TCOM
2010
102views more  TCOM 2010»
15 years 26 days ago
A system performance approach to OSNR optimization in optical networks
Abstract—This paper studies a constrained optical signal-tonoise ratio (OSNR) optimization problem in optical networks from the perspective of system performance. A system optimi...
Yan Pan, Tansu Alpcan, Lacra Pavel
ICCS
2007
Springer
15 years 6 months ago
Combining Classifiers for Web Violent Content Detection and Filtering
Keeping people away from litigious information becomes one of the most important research area in network information security. Indeed, Web filtering is used to prevent access to u...
Radhouane Guermazi, Mohamed Hammami, Abdelmajid Be...