Sciweavers

762 search results - page 150 / 153
» Modeling and Simulating Information Security Management
Sort
View
CGF
2006
145views more  CGF 2006»
13 years 5 months ago
Classification of Illumination Methods for Mixed Reality
A mixed reality (MR) represents an environment composed both by real and virtual objects. MR applications are used more and more, for instance in surgery, architecture, cultural h...
Katrien Jacobs, Céline Loscos
WWW
2008
ACM
14 years 6 months ago
User oriented link function classification
Currently most link-related applications treat all links in the same web page to be identical. One link-related application usually requires one certain property of hyperlinks but...
Mingliang Zhu, Weiming Hu, Ou Wu, Xi Li, Xiaoqin Z...
FGR
2008
IEEE
227views Biometrics» more  FGR 2008»
14 years 7 days ago
Ambient intelligence as the bridge to the future of pervasive computing
One prediction about this future of pervasive technology is that people will carry the tools needed to interface with technological resources sprinkled through out the environment...
Christopher Richard Wren, Yuri A. Ivanov
ECBS
1996
IEEE
127views Hardware» more  ECBS 1996»
13 years 10 months ago
Domain Engineering: The Challenge, Status, and Trends
Naval Surface Warfare Center Dahlgren Division; under joint sponsorship of the Office of Naval Research; the Naval Command, Control, and Ocean Surveillance Center; and the Naval S...
Stephanie White, Michael Edwards
VIZSEC
2005
Springer
13 years 11 months ago
Multiple Coordinated Views for Network Attack Graphs
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil...