Sciweavers

18 search results - page 2 / 4
» cis 2008
Sort
View
IEEESP
2008
136views more  IEEESP 2008»
13 years 5 months ago
The Crutial Way of Critical Infrastructure Protection
Today, critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other i...
Alysson Neves Bessani, Paulo Sousa, Miguel Correia...
CIS
2008
Springer
13 years 7 months ago
A Novel Motion Based Lip Feature Extraction for Lip-Reading
In a lip-reading system, one key issue is how to extract the visual features, which greatly impact on the lip-reading recognition accuracy and efficiency. In this paper, we propos...
Meng Li, Yiu-ming Cheung
CIS
2008
Springer
13 years 7 months ago
A Near-Optimal Redundancy Allocation Strategy that Minimizes a System's Vulnerability to Hazardous Events and Malicious Attacks
Delivering continuous services in information infrastructures is a major challenge. For system or network administrators, redundancy allocation is one of the best strategies to en...
Frank Yeong-Sung Lin, Po-Hao Tsang, Kun-Dao Jiang
IJBC
2008
81views more  IJBC 2008»
13 years 5 months ago
On the Location and Continuation of Hopf bifurcations in Large-Scale Problems
CL_MATCONT is a MATLAB package for the study of dynamical systems and their bifurcations. It uses a minimally augmented system for continuation of the Hopf curve. The Continuation...
M. Friedman, W. Qiu
HICSS
2008
IEEE
153views Biometrics» more  HICSS 2008»
13 years 11 months ago
Prioritizing Clinical Information System Project Risk Factors: A Delphi Study
Identifying the risks associated with the implementation of clinical information systems (CIS) in health care organizations can be a major challenge for managers, clinicians, and ...
Guy Paré, Claude Sicotte, Mirou Jaana, Davi...