Sciweavers

2740 search results - page 372 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
108
Voted
ACSAC
2006
IEEE
15 years 9 months ago
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks
Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
132
Voted
ACIVS
2006
Springer
15 years 9 months ago
A Comparison of Nearest Neighbor Search Algorithms for Generic Object Recognition
The nearest neighbor (NN) classifier is well suited for generic object recognition. However, it requires storing the complete training data, and classification time is linear in ...
Ferid Bajramovic, Frank Mattern, Nicholas Butko, J...
ACNS
2006
Springer
78views Cryptology» more  ACNS 2006»
15 years 9 months ago
DSO: Dependable Signing Overlay
Dependable digital signing service requires both high fault-tolerance and high intrusion-tolerance. While providing high fault-tolerance, existing approaches do not satisfy the hig...
Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Bl...
149
Voted
SIGMOD
2006
ACM
121views Database» more  SIGMOD 2006»
15 years 9 months ago
Derby/S: a DBMS for sample-based query answering
Although approximate query processing is a prominent way to cope with the requirements of data analysis applications, current database systems do not provide integrated and compre...
Anja Klein, Rainer Gemulla, Philipp Rösch, Wo...
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
15 years 9 months ago
Common Data Model for Design Document Exchange in Business-to-Business Networks
Design documents can be exchanged in business-tobusiness networks through Product Data Management (PDM) system integration. This rarely used approach provides new possibilities fo...
Katrine Jokinen, Jukka Borgman, Reijo Sulonen