Sciweavers

2503 search results - page 411 / 501
» Building Computer Network Attacks
Sort
View
FGCN
2007
IEEE
106views Communications» more  FGCN 2007»
15 years 7 months ago
Discovering Methodology and Scenario to Detect Covert Database System
When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of th...
Gu Taek Lee, Seokhee Lee, Elena Tsomko, Sangjin Le...
SG
2007
Springer
15 years 7 months ago
Semantic Information and Local Constraints for Parametric Parts in Interactive Virtual Construction
Abstract. This paper introduces a semantic representation for virtual prototyping in interactive virtual construction applications. The representation reflects semantic information...
Peter Biermann, Christian Fröhlich, Marc Eric...
IJCNN
2006
IEEE
15 years 7 months ago
From Light to Spikes: a Large-Scale Retina Simulator
— The purpose of this article is to provide potential neuroscientists and computer scientists with an artificial retina model, delivering spikes to higher-level visual tasks sim...
Adrien Wohrer, Pierre Kornprobst, Thierry Vi&eacut...
SUTC
2006
IEEE
15 years 7 months ago
An Indoor Localization Mechanism Using Active RFID Tag
The location-aware technology and its application are prerequisite to realize the ubiquitous computing. However, another special system for indoor localization is needed in the co...
Guang-yao Jin, Xiao-Yi Lu, Myong-Soon Park
ISNN
2005
Springer
15 years 7 months ago
Feature Selection and Intrusion Detection Using Hybrid Flexible Neural Tree
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything)...
Yuehui Chen, Ajith Abraham, Ju Yang