Sciweavers

8266 search results - page 1613 / 1654
» Information About the Journal
Sort
View
IJNSEC
2008
96views more  IJNSEC 2008»
15 years 1 months ago
Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing
The nature of the RSA public modulus N as a composite of at least two secret large primes was always considered as a major obstacle facing the RSA function sharing without the hel...
Maged Hamada Ibrahim
IIE
2006
152views more  IIE 2006»
15 years 1 months ago
ICT in Education in Finland and Hong Kong. An Overview of the Present State of the Educational System at Various Levels
This article gives a general framework for the understanding of the use of ICT in primary, secondary (vocational education excluded) and tertiary education in both Finland and Hong...
Päivi Atjonen, Siu Cheung Li
128
Voted
IJDAR
2006
245views more  IJDAR 2006»
15 years 1 months ago
Object count/area graphs for the evaluation of object detection and segmentation algorithms
Evaluation of object detection algorithms is a non-trivial task: a detection result is usually evaluated by comparing the bounding box of the detected object with the bounding box...
Christian Wolf, Jean-Michel Jolion
ISJ
2008
93views more  ISJ 2008»
15 years 1 months ago
Knowledge transfer in globally distributed teams: the role of transactive memory
Abstract. This paper explores the role of transactive memory in enabling knowledge transfer between globally distributed teams. While the information systems literature has recentl...
Ilan Oshri, Paul C. van Fenema, Julia Kotlarsky
IJNSEC
2006
132views more  IJNSEC 2006»
15 years 1 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
« Prev « First page 1613 / 1654 Last » Next »