Sciweavers

5898 search results - page 896 / 1180
» Parallel Computing Environments and Methods
Sort
View
129
Voted
ICCSA
2005
Springer
15 years 9 months ago
Security Risk Vector for Quantitative Asset Assessment
There are standard risk analysis methodologies like GMITS and ISO17799, but new threats and vulnerabilities appear day by day because the IT organizations, its infrastructure, and ...
Yoon Jung Chung, In-Jung Kim, Namhoon Lee, Taek Le...
ICCSA
2003
Springer
15 years 9 months ago
Interactive Stereoscopic Visualization of Very Large Visible Men on CAVE
Abstract. We have developed an interactive visualization software for an immersive 3D virtual environment system, which generates stereoscopic images from huge human volume dataset...
Insung Ihm, Bumdae Lee, Joong-Youn Lee, Minsu Joh,...
IWSAS
2001
Springer
15 years 8 months ago
Exercising Qualitative Control in Autonomous Adaptive Survivable Systems
We seek to construct autonomous adaptive survivable systems that use active trust management to adapt their own behavior in the face of compromises in the computational environment...
Jon Doyle, Michael McGeachie
ICPR
2010
IEEE
15 years 8 months ago
Lattice-Based Anomaly Rectification for Sport Video Annotation
Anomaly detection has received much attention within the literature as a means of determining, in an unsupervised manner, whether a learning domain has changed in a fundamental way...
Aftab Khan, David Windridge, Teofilo De Campos
DCC
1999
IEEE
15 years 8 months ago
Utilizing Soft Information in Decoding of Variable Length Codes
We present a method for utilizing soft information in decoding of variable length codes (VLCs). When compared with traditional VLC decoding, which is performed using "hard&quo...
Jiangtao Wen, John D. Villasenor