Sciweavers

7544 search results - page 1356 / 1509
» Network Forensics Analysis
Sort
View
SRDS
2003
IEEE
15 years 9 months ago
Group Communication Protocols under Errors
Group communication protocols constitute a basic building block for highly dependable distributed applications. Designing and correctly implementing a group communication system (...
Claudio Basile, Long Wang, Zbigniew Kalbarczyk, Ra...
IMC
2003
ACM
15 years 9 months ago
Source-level IP packet bursts: causes and effects
By source-level IP packet burst, we mean several IP packets sent back-to-back from the source of a flow. We first identify several causes of source-level bursts, including TCP...
Hao Jiang, Constantinos Dovrolis
AVBPA
2003
Springer
190views Biometrics» more  AVBPA 2003»
15 years 9 months ago
Combining Face and Iris Biometrics for Identity Verification
Face and iris identification have been employed in various biometric applications. Besides improving the verification performance, the fusion of both of the biometrics has several ...
Yunhong Wang, Tieniu Tan, Anil K. Jain
CAISE
2003
Springer
15 years 9 months ago
Goal-Oriented Requirements Engineering: A Case Study in E-government
This paper presents a requirements engineering framework based on the notions of Actor, Goal, and Intentional Dependency, and applies it to a case study in the field of Informatio...
Paolo Donzelli, Paolo Bresciani
ICCS
2003
Springer
15 years 9 months ago
A Compress-Based Association Mining Algorithm for Large Dataset
The association mining is one of the primary sub-areas in the field of data mining. This technique had been used in numerous practical applications, including consumer market baske...
Mafruz Zaman Ashrafi, David Taniar, Kate A. Smith
« Prev « First page 1356 / 1509 Last » Next »