Sciweavers

685 search results - page 104 / 137
» What are you looking for
Sort
View
IAW
2003
IEEE
14 years 3 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
ISORC
2003
IEEE
14 years 3 months ago
Embedded Linux Outlook in the PostPC Industry
This paper presents an analysis of the future of Embedded Linux in the PostPC industry. This analysis is carried out by first examining the current forces at work in the PostPC ma...
Seongsoo Hong
HICSS
2002
IEEE
91views Biometrics» more  HICSS 2002»
14 years 2 months ago
Electronic Marketplaces in Hong Kong's Trading Industry
Electronic marketplaces are important because of their potential to change industry structure, for example, by eliminating or altering the role of traditional intermediaries, lead...
M. Lynne Markus, Probir Banerjee, Louis C. K. Ma
ECCV
2010
Springer
14 years 2 months ago
Learning to Detect Roads in High-Resolution Aerial Images
Abstract. Reliably extracting information from aerial imagery is a difficult problem with many practical applications. One specific case of this problem is the task of automatica...
SIGMOD
2010
ACM
273views Database» more  SIGMOD 2010»
14 years 2 months ago
Google fusion tables: web-centered data management and collaboration
It has long been observed that database management systems focus on traditional business applications, and that few people use a database management system outside their workplace...
Hector Gonzalez, Alon Y. Halevy, Christian S. Jens...