Sciweavers

1897 search results - page 164 / 380
» Early application identification
Sort
View
VISUALIZATION
1992
IEEE
15 years 9 months ago
The Microscopist's Workstation
This case study looks at the issues involved in operating a sophisticated scientific instrument as a computer peripheral accessible over a high-speed network. A custom interactive...
Philip J. Mercurio, T. Todd Elvins, Stephen J. You...
139
Voted
DSOM
2007
Springer
15 years 8 months ago
Bottleneck Detection Using Statistical Intervention Analysis
Abstract. The complexity of today's large-scale enterprise applications demands system administrators to monitor enormous amounts of metrics, and reconfigure their hardware as...
Simon Malkowski, Markus Hedwig, Jason Parekh, Calt...
AGI
2008
15 years 6 months ago
Cognitive Primitives for Automated Learning
Artificial Intelligence deals with the automated simulation of human intelligent behavior. Various aspects of human faculties are tackled using computational models. It is clear th...
Sudharsan Iyengar
ISSE
2008
15 years 6 months ago
Agatha: Multimodal Biometric Authentication Platform in Large-Scale Databases
Biometric technologies are each time more demanded for security applications. In this sense, systems for identifying people are gaining popularity, especially in governmental sect...
David Hernando, David Gómez, Javier Rodr&ia...
139
Voted
AUSFORENSICS
2003
15 years 6 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver