Sciweavers

53327 search results - page 10520 / 10666
» or 2007
Sort
View
ICC
2007
IEEE
128views Communications» more  ICC 2007»
13 years 9 months ago
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection
Abstract— A clear deficiency in most of todays Anomaly Intrusion Detection Systems (AIDS) is their inability to distinguish between a new form of legitimate normal behavior and ...
Mohammad Al-Subaie, Mohammad Zulkernine
ICIP
2007
IEEE
13 years 9 months ago
Information-Based Color Feature Representation for Image Classification
1 For the image classification task, the color histogram is widely used as an important color feature indicating the content of the image. However, the high-resolution color histog...
Shi-Lin Wang, Alan Wee-Chung Liew
APSEC
2007
IEEE
14 years 3 months ago
Incentive Compatible Mechanisms for Group Ticket Allocation in Software Maintenance Services
A customer reported problem (or Trouble Ticket) in software maintenance is typically solved by one or more maintenance engineers. The decision of allocating the ticket to one or m...
Karthik Subbian, Ramakrishnan Kannan, Raghav Kumar...
AC
2008
Springer
13 years 9 months ago
Computing with RFID- Drivers, Technology and Implications
Radio Frequency Identification or simply rfid has come to be an integral part of modern computing. Rfid is notable in that it is the first practical technology to tightly couple p...
George Roussos
AC
2007
Springer
13 years 9 months ago
Free/Open Source Software Development: Recent Research Results and Methods
The focus of this chapter is to review what is known about free and open source software development (FOSSD) work practices, development processes, project and community dynamics,...
Walt Scacchi
« Prev « First page 10520 / 10666 Last » Next »