Sciweavers

6318 search results - page 1247 / 1264
» Data Leakage Detection
Sort
View
CN
2007
89views more  CN 2007»
14 years 9 months ago
Determining an appropriate sending rate over an underutilized network path
Determining an appropriate sending rate when beginning data transmission into a network with unknown characteristics is a fundamental issue in best-effort networks. Traditionally,...
Pasi Sarolahti, Mark Allman, Sally Floyd
IS
2008
14 years 9 months ago
Conformance checking of processes based on monitoring real behavior
Many companies have adopted Process-aware Information Systems (PAIS) to support their business processes in some form. On the one hand these systems typically log events (e.g., in ...
Anne Rozinat, Wil M. P. van der Aalst
ISF
2008
210views more  ISF 2008»
14 years 9 months ago
Affective e-Learning in residential and pervasive computing environments
This article examines how emerging pervasive computing and affective computing technologies might enhance the adoption of ICT in e-Learning which takes place in the home and wider ...
Liping Shen, Victor Callaghan, Ruimin Shen
JNW
2008
83views more  JNW 2008»
14 years 9 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
JCB
2006
215views more  JCB 2006»
14 years 9 months ago
Protein Fold Recognition Using Segmentation Conditional Random Fields (SCRFs)
Protein fold recognition is an important step towards understanding protein three-dimensional structures and their functions. A conditional graphical model, i.e., segmentation con...
Yan Liu 0002, Jaime G. Carbonell, Peter Weigele, V...
« Prev « First page 1247 / 1264 Last » Next »