Sciweavers

6318 search results - page 1214 / 1264
» Data Leakage Detection
Sort
View
SOUPS
2009
ACM
15 years 8 months ago
Look into my eyes!: can you guess my password?
Authentication systems for public terminals – and thus public spaces – have to be fast, easy and secure. Security is of utmost importance since the public setting allows manif...
Alexander De Luca, Martin Denzel, Heinrich Hussman...
ICDCS
2008
IEEE
15 years 8 months ago
Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses
Distributed Denial-of-Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time. The relative ease an...
Muthusrinivasan Muthuprasanna, Govindarasu Manimar...
99
Voted
ICRA
2008
IEEE
131views Robotics» more  ICRA 2008»
15 years 8 months ago
Towards a needle driver robot for radiofrequency ablation of tumors under continuous MRI
— This paper presents an initial design and feasibility study for a 1-DOF Magnetic Resonance Imaging (MRI) compatible needle driver robot for radiofrequency ablation (RFA). This ...
Rebecca Kokes, Kevin Lister, Rao Gullapalli, Bao Z...
ICSM
2008
IEEE
15 years 8 months ago
Query-based filtering and graphical view generation for clone analysis
Code clones are similar program structures recurring in software systems. Clone detectors produce much information and a challenge is to identify useful clones depending on the go...
Yali Zhang, Hamid Abdul Basit, Stan Jarzabek, Dang...
CEC
2007
IEEE
15 years 8 months ago
Concerning the potential of evolutionary support vector machines
— Within the present paper, we put forward a novel hybridization between support vector machines and evolutionary algorithms. Evolutionary support vector machines consider the cl...
Ruxandra Stoean, Mike Preuss, Catalin Stoean, Dumi...
« Prev « First page 1214 / 1264 Last » Next »