Sciweavers

1737 search results - page 35 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
ICASSP
2007
IEEE
14 years 2 months ago
Statistical Analysis of the Global Geodesic Function for 3D Object Classification
This paper presents a novel classification strategy for 3D objects. Our technique is based on using a Global Geodesic Function to intrinsically describe the surface ofan object. T...
Djamila Aouada, Shuo Feng, Hamid Krim
ACSAC
2008
IEEE
14 years 2 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
PERCOM
2004
ACM
14 years 7 months ago
Proselytizing Pervasive Computing Education: A Strategy and Approach Influenced by Human-Computer Interaction
A course on pervasive computing should be structured around key functions throughout a systems development process to cover common underlying concerns throughout science and engin...
D. Scott McCrickard, Christa M. Chewar
ECIS
2004
13 years 9 months ago
SMEs and internet adoption strategy: who do SMEs listen to?
Governments have developed policies and strategies which are designed to assist SMEs to become eenabled. It is not clear what impact these strategies have on SMEs. There is some e...
Martin Beckinsale, Margi Levy
BROADNETS
2005
IEEE
14 years 1 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang