Sciweavers

291 search results - page 51 / 59
» Enforceable social laws
Sort
View
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
15 years 3 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
95
Voted
ISI
2007
Springer
15 years 3 months ago
Mining Higher-Order Association Rules from Distributed Named Entity Databases
The burgeoning amount of textual data in distributed sources combined with the obstacles involved in creating and maintaining central repositories motivates the need for effective ...
Shenzhi Li, Christopher D. Janneck, Aditya P. Bela...
LSSC
2007
Springer
15 years 3 months ago
Bridging Methods for Coupling Atomistic and Continuum Models
Abstract. We review some recent developments in the coupling of atomistic and continuum models based on the blending of the two models in a bridge region connecting the other two r...
Santiago Badia, Pavel B. Bochev, Max Gunzburger, R...
79
Voted
AIPR
2003
IEEE
15 years 2 months ago
Quick Response Airborne Deployment of Viper Muzzle Flash Detection and Location System During DC Sniper Attacks
The VIPER infrared muzzle flash detection system was deployed from a helicopter and an airship in response to the Washington, DC area sniper attacks in October 2002. The system co...
M. Pauli, M. C. Ertem, E. Heidhausen
ICPR
2010
IEEE
15 years 1 months ago
Detecting Altered Fingerprints
Abstract--The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring t...
Jianjiang Feng, Anil Jain, Arun Ross