Sciweavers

1422 search results - page 248 / 285
» A Framework for Understanding Botnets
Sort
View
TWC
2008
154views more  TWC 2008»
15 years 3 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
CIKM
2010
Springer
15 years 2 months ago
Building re-usable dictionary repositories for real-world text mining
Text mining, though still a nascent industry, has been growing quickly along with the awareness of the importance of unstructured data in business analytics, customer retention an...
Shantanu Godbole, Indrajit Bhattacharya, Ajay Gupt...
JTAER
2008
118views more  JTAER 2008»
15 years 2 months ago
Service and Document Based Interoperability for European eCustoms Solutions
Innovative eCustoms solutions play an important role in the pan-European eGovernment strategy. The underlying premise is interoperability postulating a common understanding of pro...
Tobias Vogel, Alexander Schmidt, Alexander Lemm, H...
164
Voted
JKM
2010
131views more  JKM 2010»
15 years 2 months ago
Beyond the ba: managing enabling contexts in knowledge organizations
Purpose – Looking at the practical experience of organizations pursuing knowledge management, it is found that their efforts are primarily focused on creating the conditions and...
Chun Wei Choo, Rivadávia Correa Drummond de...
ICIP
2010
IEEE
15 years 2 months ago
Barcode-based calibration of a 1-D blur restoration pipeline
: External Posting Date: October 21, 2010 [Fulltext] Approved for External Publication Internal Posting Date: October 21, 2010 [Fulltext] Barcode-Based Calibration of a 1-D Blur R...
Matthew Gaubatz, Steven J. Simske