Sciweavers

13180 search results - page 2237 / 2636
» Network Models
Sort
View
FPT
2005
IEEE
132views Hardware» more  FPT 2005»
15 years 10 months ago
Implementation of Gabor-Type Filters on Field Programmable Gate Arrays
Although biological visual systems have been widely studied at the physiological, psychophysical and functional levels, our understanding of its signal processing mechanisms is st...
Ocean Y. H. Cheung, Philip Heng Wai Leong, Eric K....
HICSS
2005
IEEE
134views Biometrics» more  HICSS 2005»
15 years 10 months ago
The Move to Artist-Led Online Music Distribution: Explaining Structural Changes in the Digital Music Market
We propose a model for understanding the transformation of the market structure in the recorded music industry value chain due to new forms of digital distribution. It takes into a...
Jesse Bockstedt, Robert J. Kauffman, Frederick J. ...
ICDCSW
2005
IEEE
15 years 10 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
ICDCSW
2005
IEEE
15 years 10 months ago
Policy-Controlled Event Management for Distributed Intrusion Detection
A powerful strategy in intrusion detection is the separation of surveillance mechanisms from a site’s policy for processing observed events. The Bro intrusion detection system h...
Christian Kreibich, Robin Sommer
ICECCS
2005
IEEE
87views Hardware» more  ICECCS 2005»
15 years 10 months ago
Scavenging Complex Genomic Information Using Mobile Code: An Evaluation
Mobile code solutions can improve the performances of applications over the Internet by reducing the amount of data that must be transferred across the network. The research on ge...
Mauro Pezzè, Davide Tosi, Gian Pietro Picco
« Prev « First page 2237 / 2636 Last » Next »