Sciweavers

3907 search results - page 745 / 782
» Information requirements engineering for data warehouse syst...
Sort
View
98
Voted
COMSUR
2007
101views more  COMSUR 2007»
15 years 1 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
CORR
2007
Springer
138views Education» more  CORR 2007»
15 years 1 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy
91
Voted
ENVSOFT
2007
109views more  ENVSOFT 2007»
15 years 1 months ago
The Automated Geospatial Watershed Assessment tool
A toolkit for distributed hydrologic modeling at multiple scales using two independent models within a geographic information system is presented. This open-source, freely availab...
Scott N. Miller, Darius J. Semmens, David C. Goodr...
146
Voted
PAMI
2002
195views more  PAMI 2002»
15 years 1 months ago
Detecting Faces in Images: A Survey
Images containing faces are essential to intelligent vision-based human computer interaction, and research efforts in face processing include face recognition, face tracking, pose ...
Ming-Hsuan Yang, David J. Kriegman, Narendra Ahuja
144
Voted
ATS
2010
IEEE
229views Hardware» more  ATS 2010»
14 years 12 months ago
Variation-Aware Fault Modeling
Abstract--To achieve a high product quality for nano-scale systems both realistic defect mechanisms and process variations must be taken into account. While existing approaches for...
Fabian Hopsch, Bernd Becker, Sybille Hellebrand, I...