Sciweavers

1733 search results - page 83 / 347
» Critical Information Systems Research: A Habermasian Approac...
Sort
View
DFN
2003
15 years 2 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
113
Voted
CAISE
2008
Springer
15 years 3 months ago
Modelling, Simulation, and Performance Analysis of Business Processes Involving Ubiquitous Systems
A recent trend in Ubiquitous Computing is that embedded software (e.g. in production machines, wired or wireless networked sensors and actuators, or RFID readers) directly offers W...
Patrik Spieß, Dinh Khoa Nguyen, Ingo Weber, ...
RTSS
2005
IEEE
15 years 7 months ago
A Hybrid Static/Dynamic DVS Scheduling for Real-Time Systems with (m, k)-Guarantee
Energy reduction is critical to increase the mobility and to extend the mission period in the development of today’s pervasive computing systems. On the other hand, however, ene...
Linwei Niu, Gang Quan
HASE
2008
IEEE
15 years 8 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
AMR
2005
Springer
83views Multimedia» more  AMR 2005»
15 years 7 months ago
Toward Consistent Evaluation of Relevance Feedback Approaches in Multimedia Retrieval
Many different communities have conducted research on the efficacy of relevance feedback in multimedia information systems. Unlike text IR, performance evaluation of multimedia IR...
Xiangyu Jin, James C. French, Jonathan Michel