Sciweavers

1733 search results - page 202 / 347
» Critical Information Systems Research: A Habermasian Approac...
Sort
View
JSAC
2007
93views more  JSAC 2007»
15 years 1 months ago
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
— Vehicular Networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor an...
Maxim Raya, Panagiotis Papadimitratos, Imad Aad, D...
NDQA
2003
96views Education» more  NDQA 2003»
15 years 3 months ago
A Technique to Resolve Contradictory Answers
With the ever-increasing amount of textual information available, it is becoming increasingly unlikely that a single document will provide the answer to a question. A more likely ...
Catherine Blake
IJCNN
2007
IEEE
15 years 8 months ago
Risk Assessment Algorithms Based on Recursive Neural Networks
— The assessment of highly-risky situations at road intersections have been recently revealed as an important research topic within the context of the automotive industry. In thi...
Alejandro Chinea Manrique De Lara, Michel Parent
126
Voted
CSUR
2004
149views more  CSUR 2004»
15 years 1 months ago
A review of vessel extraction techniques and algorithms
Vessel segmentation algorithms are the critical components of circulatory blood vessel analysis systems. We present a survey of vessel extraction techniques and algorithms. We put ...
Cemil Kirbas, Francis K. H. Quek
SAC
2010
ACM
15 years 8 months ago
Ontology-based generation of IT-security metrics
Legal regulations and industry standards require organizations to measure and maintain a specified IT-security level. Although several IT-security metrics approaches have been de...
Stefan Fenz