Sciweavers

323 search results - page 38 / 65
» Alert Detection in System Logs
Sort
View
80
Voted
SISW
2003
IEEE
15 years 4 months ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
77
Voted
ICPR
2010
IEEE
15 years 5 months ago
Discrimination of Moderate and Acute Drowsiness Based on Spontaneous Facial Expressions
It is important for drowsiness detection systems to warn the driver before the critical stages of drowsiness arise and thus to provide sufficient intervention time for the driver...
Esra Vural, Marian Stewart Bartlett, Gwen Littlewo...
80
Voted
FC
2005
Springer
149views Cryptology» more  FC 2005»
15 years 4 months ago
Ciphire Mail Email Encryption and Authentication
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Lars Eilebrecht
ICDE
2010
IEEE
198views Database» more  ICDE 2010»
15 years 4 months ago
Power-aware data analysis in sensor networks
Abstract— Sensor networks have evolved to a powerful infrastructure component for event monitoring in many application scenarios. In addition to simple filter and aggregation op...
Daniel Klan, Katja Hose, Marcel Karnstedt, Kai-Uwe...
ASSETS
2008
ACM
15 years 26 days ago
Computer vision-based clear path guidance for blind wheelchair users
We describe a system for guiding blind and visually impaired wheelchair users along a clear path that uses computer vision to sense the presence of obstacles or other terrain feat...
Volodymyr Ivanchenko, James Coughlan, William Gerr...