Sciweavers

4511 search results - page 592 / 903
» Observation Based System Security
Sort
View
ICDE
2006
IEEE
130views Database» more  ICDE 2006»
16 years 5 months ago
Warehousing and Analyzing Massive RFID Data Sets
Radio Frequency Identification (RFID) applications are set to play an essential role in object tracking and supply chain management systems. In the near future, it is expected tha...
Hector Gonzalez, Jiawei Han, Xiaolei Li, Diego Kla...
JCP
2007
126views more  JCP 2007»
15 years 4 months ago
ADE: Utility Driven Self-management in a Networked Environment
ADE, autonomic distributed environment, is a system which engages autonomic elements to automatically take an existing centralized application and distribute it across available re...
Debzani Deb, M. Muztaba Fuad, Michael J. Oudshoorn
UMUAI
1998
101views more  UMUAI 1998»
15 years 4 months ago
An Evidential Model for Tracking Initiative in Collaborative Dialogue Interactions
In this paper, we argue for the need to distinguish between task initiative and dialogue initiative, and present an evidential model for tracking shifts in both types of initiativ...
Jennifer Chu-Carroll, Michael K. Brown
ICCV
2009
IEEE
16 years 9 months ago
Efficient Privacy Preserving Video Surveillance
Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of int...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
ICSE
2008
IEEE-ACM
16 years 4 months ago
LISABETH: automated content-based signature generator for zero-day polymorphic worms
Modern worms can spread so quickly that any countermeasure based on human reaction might not be fast enough. Recent research has focused on devising algorithms to automatically pr...
Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer, Matti...