Sciweavers

1546 search results - page 294 / 310
» Context-Aware Computing with Sound
Sort
View
GI
2009
Springer
15 years 1 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
GI
2009
Springer
15 years 1 months ago
Contact Fusion and Multi-Hypotheses Tracking for Low Frequency Active Sonar Data
Abstract: Towed low frequency active sonar systems (LFAS) are used in Anti-Submarine Warfare (ASW) to detect submarines. LFAS systems are hampered by reverberation in shallow water...
Kathrin Seget, Holger Schmaljohann, Arne Schulz
BIOINFORMATICS
2011
14 years 11 months ago
Integrative network alignment reveals large regions of global network similarity in yeast and human
Motivation: High-throughput methods for detecting molecular interactions have produced large sets of biological network data with much more yet to come. Analogous to sequence alig...
Oleksii Kuchaiev, Natasa Przulj
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 7 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
COMPGEOM
2011
ACM
14 years 7 months ago
Persistence-based clustering in riemannian manifolds
We present a clustering scheme that combines a mode-seeking phase with a cluster merging phase in the corresponding density map. While mode detection is done by a standard graph-b...
Frédéric Chazal, Leonidas J. Guibas,...