Sciweavers

7602 search results - page 38 / 1521
» A New Approach to Base Revision
Sort
View
DBSEC
2008
89views Database» more  DBSEC 2008»
15 years 3 months ago
A New Approach to Secure Logging
Abstract. The need for secure logging is well-understood by the security professionals, including both researchers and practitioners. The ability to efficiently verify all (or some...
Di Ma, Gene Tsudik
ASC
2004
15 years 1 months ago
Clustering terms in the Bayesian network retrieval model: a new approach with two term-layers
The retrieval performance of an information retrieval system usually increases when it uses the relationships among the terms contained in a given document collection. However, th...
Luis M. de Campos, Juan M. Fernández-Luna, ...
JIPS
2010
216views more  JIPS 2010»
14 years 8 months ago
Fingerprint Detection Using Canny Filter and DWT, a New Approach
This paper proposes two new methods to detect the fingerprints of different persons based on one-dimensional and two-dimensional discrete wavelet transformations (DWTs). Recent lit...
Md. Imdadul Islam, Nasima Begum, Mahbubul Alam, M....
IDA
2005
Springer
15 years 7 months ago
Miner Ants Colony: A New Approach to Solve a Mine Planning Problem
In this paper we introduce a simple ant based algorithm for solving a copper mine planning problem. In the last 10 years this realworld problem has been tackled using linear intege...
María-Cristina Riff, Michael Moossen, Xavie...
DASC
2006
IEEE
15 years 8 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...