Sciweavers

897 search results - page 16 / 180
» Identity: How to name it, How to find it
Sort
View
COMPSEC
2006
110views more  COMPSEC 2006»
14 years 11 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
ERCIMDL
2004
Springer
112views Education» more  ERCIMDL 2004»
15 years 5 months ago
System Support for Name Authority Control Problem in Digital Libraries: OpenDBLP Approach
In maintaining Digital Libraries, having bibliographic data up-to-date is critical, yet often minor irregularities may cause information isolation. Unlike documents for which vario...
Yoojin Hong, Byung-Won On, Dongwon Lee
COMPSAC
2010
IEEE
14 years 9 months ago
A Consistency Model for Identity Information in Distributed Systems
In distributed IT systems, replication of information is commonly used to strengthen the fault tolerance on a technical level or the autonomy of an organization on a business level...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...
CORR
2004
Springer
86views Education» more  CORR 2004»
14 years 11 months ago
Evolutionary design of photometric systems and its application to Gaia
How do I find the optimal photometric system for a survey? Designing a photometric system to best fulfil a set of scientific goals is a complex task, demanding a compromise betwee...
Coryn A. L. Bailer-Jones
75
Voted
AIRS
2005
Springer
15 years 5 months ago
Finding New News: Novelty Detection in Broadcast News
The automatic detection of novelty, or newness, as part of an information retrieval system would greatly improve a searcher’s experience by presenting “documents” in order of...
Georgina Gaughan, Alan F. Smeaton