Sciweavers

450 search results - page 20 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
MIR
2010
ACM
206views Multimedia» more  MIR 2010»
15 years 3 months ago
An investigation into the relationship between semantic and content based similarity using LIDC
There is considerable research in the field of content-based medical image retrieval; however, few of the current systems investigate the relationship between the radiologists’...
Robert Kim, Grace Dasovich, Runa Bhaumik, Richard ...
CNSR
2010
IEEE
124views Communications» more  CNSR 2010»
15 years 3 days ago
Challenges and Direction toward Secure Communication in the SCADA System
In the past few years the security issues in the supervisory control and data acquisition (SCADA) system have been investigated, and many security mechanisms have been proposed fro...
Sugwon Hong, Myungho Lee
GI
2001
Springer
15 years 2 months ago
Infrastructure for Pervasive Computing: Challenges
: As mobile and embedded computing devices become more pervasive, it is becoming obvious that the nature of interactions between users and computers must evolve. Applications need ...
Karen Henricksen, Jadwiga Indulska, Andry Rakotoni...
CCR
2007
168views more  CCR 2007»
14 years 9 months ago
Challenges in peer-to-peer gaming
While multi-player online games are very successful, their fast deployment suffers from their server-based architecture. Indeed, servers both limit the scalability of the games a...
Christoph Neumann, Nicolas Prigent, Matteo Varvell...
ECIS
2003
14 years 11 months ago
An empirical investigation of determinants to buy application services from ASPs
The Application Service Provider (ASP) is a pivotal point in the organization of information systems, since it brings up a new paradigm: “make, buy or rent”. An ASP is a compa...
Vincenzo Morabito