Sciweavers

1303 search results - page 199 / 261
» Ambient Information Systems: Evaluation in Two Paradigms
Sort
View
108
Voted
EUROSEC
2010
ACM
15 years 7 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
ACCV
1998
Springer
15 years 6 months ago
Montage: An Image Database for the Fashion, Textile, and Clothing Industry in Hong Kong
Abstract. The fashion, textile, and clothing industry is a main constituent in Hong Kong. In this industry, handling a large amount of images is an important task in various phases...
Tak-Kan Lau, Irwin King
RTSS
1996
IEEE
15 years 6 months ago
Scheduling transactions with temporal constraints: exploiting data semantics
In this paper, issues involved in the design of a real-time database which maintains data temporal consistency are discussed. The concept of data-deadline is introduced and time co...
Ming Xiong, Rajendran M. Sivasankaran, John A. Sta...
ICCAD
1994
IEEE
144views Hardware» more  ICCAD 1994»
15 years 6 months ago
Power analysis of embedded software: a first step towards software power minimization
Embedded computer systems are characterized by the presence of a dedicated processor and the software that runs on it. Power constraints are increasingly becoming the critical com...
Vivek Tiwari, Sharad Malik, Andrew Wolfe
CSE
2009
IEEE
15 years 5 months ago
Social Tagging in Query Expansion: A New Way for Personalized Web Search
Social networks and collaborative tagging systems are rapidly gaining popularity as primary means for sorting and sharing data: users tag their bookmarks in order to simplify infor...
Claudio Biancalana, Alessandro Micarelli