Sciweavers

7596 search results - page 267 / 1520
» Challenges in forensic computing
Sort
View
274
Voted
MICCAI
2010
Springer
15 years 10 months ago
  A Fully Automated Approach to Segmentation of Irregularly Shaped Cellular Structures in EM Images
While there has been substantial progress in segmenting natural im- ages, state-of-the-art methods that perform well in such tasks unfortunately tend to underperform ...
A. Lucchi, K. Smith, R. Achanta, V. Lepetit, P. Fu...
ICT
2004
Springer
158views Communications» more  ICT 2004»
15 years 10 months ago
MobiS: A Solution for the Development of Secure Applications for Mobile Devices
With the mobile computing evolution, portable devices have emerged in the market with the possibility of connection to IP networks using wireless technologies. The migration from f...
Windson Viana, José Bringel Filho, Katy C. ...
SDMW
2004
Springer
15 years 10 months ago
Secure and Privacy Preserving Outsourcing of Tree Structured Data
With the increasing use of web services, many new challenges concerning data security are becoming critical. Data or applications can now be outsourced to powerful remote servers, ...
Ping Lin, K. Selçuk Candan
HPDC
2003
IEEE
15 years 10 months ago
Policy Driven Heterogeneous Resource Co-Allocation with Gangmatching
Dynamic, heterogenous and distributively owned resource environments present unique challenges to the problems of resource representation, allocation and management. Conventional ...
Rajesh Raman, Miron Livny, Marvin H. Solomon
NCA
2003
IEEE
15 years 9 months ago
Source-End DDoS Defense
A successful source-end DDoS defense enables early suppression of the attack and minimizes collateral damage. However, such an approach faces many challenges: (a) distributing the...
Jelena Mirkovic, Gregory Prier, Peter L. Reiher