Sciweavers

4955 search results - page 719 / 991
» Multiple Pattern Databases
Sort
View
90
Voted
ICSOFT
2008
15 years 4 months ago
A Mental Health Self-Check System using Nonlinear Analysis of Pulse Waves
Previously, we demonstrated that simple, low-cost measurement of an individual's mental health is possible using nonlinear analysis of pulse waves. Here we introduce a trial s...
Mayumi Oyama-Higa, Kazuo Sato, Kazuyoshi Tanaka, T...
175
Voted
CAU
2004
192views Cryptology» more  CAU 2004»
15 years 4 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow
107
Voted
CASCON
2006
136views Education» more  CASCON 2006»
15 years 4 months ago
Workload adaptation in autonomic DBMSs
Workload adaptation is a performance management process in which an autonomic database management system (DBMS) efficiently makes use of its resources by filtering or controlling ...
Baoning Niu, Patrick Martin, Wendy Powley, Randy H...
116
Voted
CLA
2006
15 years 4 months ago
First Elements on Knowledge Discovery Guided by Domain Knowledge (KDDK)
In this paper, we present research trends carried out in the Orpailleur team at loria, showing how knowledge discovery and knowledge processing may be combined. The knowledge disco...
Jean Lieber, Amedeo Napoli, Laszlo Szathmary, Yann...
83
Voted
CSREASAM
2006
15 years 4 months ago
Network Intrusion Detection System with Data Mart
- Network Intrusion Detection Systems (NIDS) capture large amounts of data that is difficult or impractical to report and analyze directly from the capture device. It is also commo...
Richard Wasniowski