Sciweavers

452 search results - page 47 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
CHI
2004
ACM
15 years 10 months ago
Acquiring in situ training data for context-aware ubiquitous computing applications
Ubiquitous, context-aware computer systems may ultimately enable computer applications that naturally and usefully respond to a user's everyday activity. Although new algorit...
Stephen S. Intille, Ling Bao, Emmanuel Munguia Tap...
STORAGESS
2005
ACM
15 years 3 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
ICIC
2009
Springer
15 years 4 months ago
Ontology-Based Decision Support for Security Management in Heterogeneous Networks
Abstract. In this paper our original methodology of applying ontologybased logic into decision support system for security management in heterogeneous networks is presented. Such d...
Michal Choras, Rafal Kozik, Adam Flizikowski, Rafa...
INTERACT
2003
14 years 11 months ago
Real Time Head Gesture Recognition in Affective Interfaces
: In this paper we present the affective message box, a dialog box that employs a real time head gesture recognition system as its input modality. Head nods and shakes correspond t...
Rana El Kaliouby, Peter Robinson
USENIX
2007
15 years 2 days ago
Load Shedding in Network Monitoring Applications
Monitoring and mining real-time network data streams is crucial for managing and operating data networks. The information that network operators desire to extract from the network...
Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanju&...