Sciweavers

7952 search results - page 440 / 1591
» Methods for Measuring Usability
Sort
View
ICC
2009
IEEE
164views Communications» more  ICC 2009»
15 years 2 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
WWW
2011
ACM
15 years 1 days ago
A case for query by image and text content: searching computer help using screenshots and keywords
The multimedia information retrieval community has dedicated extensive research effort to the problem of content-based image retrieval (CBIR). However, these systems find their ma...
Tom Yeh, Brandyn White, Jose San Pedro, Boris Katz...
BIRTHDAY
2011
Springer
14 years 5 months ago
Algorithmic Aspects of Risk Management
Abstract. Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In c...
Ashish Gehani, Lee Zaniewski, K. Subramani
IHI
2012
217views Healthcare» more  IHI 2012»
14 years 21 days ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
3DPVT
2004
IEEE
115views Visualization» more  3DPVT 2004»
15 years 9 months ago
Specularity Elimination in Range Sensing for Accurate 3D Modeling of Specular Objects
We present a novel range sensing method that is capable of constructing accurate 3D models of specular objects. Our method utilizes a new range imaging concept called multi-peak r...
Johnny Park, Avinash C. Kak