Sciweavers

326 search results - page 39 / 66
» Visualization in law enforcement
Sort
View
DGO
2007
192views Education» more  DGO 2007»
13 years 9 months ago
D-HOTM: distributed higher order text mining
We present D-HOTM, a framework for Distributed Higher Order Text Mining based on named entities extracted from textual data that are stored in distributed relational databases. Unl...
William M. Pottenger
ISSA
2008
13 years 9 months ago
No Age Discrimination for Biometrics
Biometric advances apply to a range of disciplines to ensure the safety and security of individuals and groups. To stress the value of biometrics, this study focuses on the applic...
Marthie Lessing, Lara Weissenberger
SDM
2007
SIAM
145views Data Mining» more  SDM 2007»
13 years 9 months ago
Finding Motifs in a Database of Shapes
The problem of efficiently finding images that are similar to a target image has attracted much attention in the image processing community and is rightly considered an informatio...
Xiaopeng Xi, Eamonn J. Keogh, Li Wei, Agenor Mafra...
ISTA
2004
13 years 9 months ago
On a Network Forensics Model For Information Security
: The employment of a patchwork of nonintegrated security products can only provide incomplete coverage, which cannot give the total panorama of the network misuse behavior. Networ...
Wei Ren
FC
2010
Springer
150views Cryptology» more  FC 2010»
13 years 8 months ago
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets
Abstract. It is becoming more common for researchers to find themselves in a position of being able to take over control of a malicious botnet. If this happens, should they use thi...
David Dittrich, Felix Leder, Tillmann Werner