Sciweavers

341 search results - page 54 / 69
» A Security Engineering Process based on Patterns
Sort
View
AIEDAM
2007
191views more  AIEDAM 2007»
14 years 11 months ago
Ontology-based design information extraction and retrieval
Because of the increasing complexity of products and the design process, as well as the popularity of computer-aided documentation tools, the number of electronic and textual desi...
Zhanjun Li, Karthik Ramani
ACSAC
2004
IEEE
15 years 3 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
CASCON
2003
116views Education» more  CASCON 2003»
15 years 1 months ago
Workload characterization for an E-commerce web site
Electronic commerce servers have a significant presence in today’s Internet. Corporations require good performance for their business processes. To date, little empirical evide...
Qing Wang, Dwight J. Makaroff, H. Keith Edwards, R...
ICSOC
2004
Springer
15 years 5 months ago
Knowledge-driven interactions with services across ad hoc networks
Service oriented computing, with its aim of unhindered interoperability, is an appropriate paradigm for ad hoc networks, which are characterized by physical mobility of heterogeno...
Rohan Sen, Radu Handorean, Gruia-Catalin Roman, Gr...
ICAPR
2005
Springer
15 years 5 months ago
Fingerprint Image Enhancement Using STFT Analysis
Contrary to popular belief, despite decades of research in fingerprints, reliable fingerprint recognition is an open problem. Extracting features out of poor quality prints is t...
Sharat Chikkerur, Venu Govindaraju, Alexander N. C...