Sciweavers

5481 search results - page 1004 / 1097
» Application Analysis for Parallel Processing
Sort
View
ACSAC
2004
IEEE
15 years 1 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
ICPR
2010
IEEE
15 years 1 months ago
PILL-ID: Matching and Retrieval of Drug Pill Imprint Images
—Automatic illicit drug pill matching and retrieval is becoming an important problem due to an increase in the number of tablet type illicit drugs being circulated in our society...
Young-Bum Lee, Unsang Park, Anil Jain
BPM
2004
Springer
148views Business» more  BPM 2004»
15 years 1 months ago
Interactive Workflow Mining
Many information systems log event data about executed tasks. Workflow mining is concerned with the derivation of a graphical workflow model out of this data. Experience from appl...
Markus Hammori, Joachim Herbst, Niko Kleiner
APNOMS
2006
Springer
15 years 1 months ago
Improved Handoff Performance Based on Pre-binding Update in HMIPv6
Abstract. In this paper, an efficient neighbor AR (Access Router) discovery scheme and handoff procedure using neighbor information are proposed. It allows each AR and Mobility Anc...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
CVPR
2004
IEEE
15 years 1 months ago
Camera Calibration from a Single Night Sky Image
We present a simple and universal camera calibration method. Instead of extensive setups we are exploiting the accurate angular positions of fixed stars. High precision is achieve...
Andreas Klaus, Joachim Bauer, Konrad F. Karner, Pi...
« Prev « First page 1004 / 1097 Last » Next »