Sciweavers

3524 search results - page 374 / 705
» Issues in Active Databases
Sort
View
DAGSTUHL
2007
15 years 6 months ago
Ubiquitous Nature of Event-Driven Approaches: A Retrospective View
This paper retrospectively analyzes the progress of event-based capability and their applicability in various domains. Although research on event-based approaches started in a hum...
Sharma Chakravarthy, Raman Adaikkalavan
ISSA
2004
15 years 6 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo
DFN
2009
15 years 6 months ago
Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks
: While more and more applications require higher network bandwidth, there is also a tendency that large portions of this bandwidth are misused for dubious purposes, such as unauth...
Florian Mansmann, Fabian Fischer, Daniel A. Keim, ...
AEI
2006
122views more  AEI 2006»
15 years 5 months ago
Construction informatics: Definition and ontology
This paper proposes a definition, scope and topics of construction informatics--a discipline also known as `construction IT' or `communication and information technologies in...
Ziga Turk
ACCV
2010
Springer
15 years 5 days ago
On the Use of Implicit Shape Models for Recognition of Object Categories in 3D Data
The ability of recognizing object categories in 3D data is still an underdeveloped topic. This paper investigates on adopting Implicit Shape Models (ISMs) for 3D categorization, th...
Samuele Salti, Federico Tombari, Luigi di Stefano