Sciweavers

4511 search results - page 518 / 903
» Observation Based System Security
Sort
View
CORR
2006
Springer
112views Education» more  CORR 2006»
15 years 5 months ago
Pull-Based Data Broadcast with Dependencies: Be Fair to Users, not to Items
Broadcasting is known to be an efficient means of disseminating data in wireless communication environments (such as Satellite, mobile phone networks,...). It has been recently ob...
Julien Robert, Nicolas Schabanel
TKDE
2010
197views more  TKDE 2010»
14 years 11 months ago
Filtering Data Streams for Entity-Based Continuous Queries
The idea of allowing query users to relax their correctness requirements in order to improve performance of a data stream management system (e.g., location-based services and senso...
Reynold Cheng, Benjamin C. M. Kao, Alan Kwan, Suni...
NDSS
2009
IEEE
15 years 11 months ago
Scalable, Behavior-Based Malware Clustering
Anti-malware companies receive thousands of malware samples every day. To process this large quantity, a number of automated analysis tools were developed. These tools execute a m...
Ulrich Bayer, Paolo Milani Comparetti, Clemens Hla...
151
Voted
VIP
2001
15 years 6 months ago
Web-based Image Authentication Using Invisible Fragile Watermark
The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret i...
Yusuk Lim, Changsheng Xu, David Dagan Feng
AGENTS
2001
Springer
15 years 9 months ago
AgentSalon: facilitating face-to-face knowledge exchange through conversations among personal agents
This paper presents a system called AgentSalon, which facilitates face-to-face knowledge exchange and discussion by people having shared interests, in museums, schools, offices, a...
Yasuyuki Sumi, Kenji Mase