Sciweavers

20878 search results - page 3754 / 4176
» Database
Sort
View
CORR
2010
Springer
123views Education» more  CORR 2010»
15 years 5 months ago
Integrating Innate and Adaptive Immunity for Intrusion Detection
Abstract. Network Intrusion Detection Systems (NIDS) monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches h...
Gianni Tedesco, Jamie Twycross, Uwe Aickelin
COMPUTER
2008
66views more  COMPUTER 2008»
15 years 5 months ago
Into the Wild: Low-Cost Ubicomp Prototype Testing
ions and techniques such as activity models, storyboards, and programming by demonstration (Y. Li and J. Landay, "Activity-Based Prototyping of Ubicomp Applications for Long-L...
Yang Li, James A. Landay
CORR
2010
Springer
195views Education» more  CORR 2010»
15 years 5 months ago
Dynamic management of transactions in distributed real-time processing system
Managing the transactions in real time distributed computing system is not easy, as it has heterogeneously networked computers to solve a single problem. If a transaction runs acr...
Y. Jayanta Singh, Yumnam Somananda Singh, Ashok Ga...
143
Voted
CORR
2010
Springer
138views Education» more  CORR 2010»
15 years 5 months ago
Data Stream Clustering: Challenges and Issues
Very large databases are required to store massive amounts of data that are continuously inserted and queried. Analyzing huge data sets and extracting valuable pattern in many appl...
Madjid Khalilian, Norwati Mustapha
CORR
2010
Springer
184views Education» more  CORR 2010»
15 years 5 months ago
Image Pixel Fusion for Human Face Recognition
In this paper we present a technique for fusion of optical and thermal face images based on image pixel fusion approach. Out of several factors, which affect face recognition perfo...
Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita...
« Prev « First page 3754 / 4176 Last » Next »