Sciweavers

1425 search results - page 250 / 285
» Providing quality of service monitoring: challenges and appr...
Sort
View
ICEGOV
2007
ACM
15 years 3 months ago
Formal threat descriptions for enhancing governmental risk assessment
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...
ICETE
2004
204views Business» more  ICETE 2004»
15 years 1 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
BMCBI
2006
170views more  BMCBI 2006»
14 years 12 months ago
Biclustering of gene expression data by non-smooth non-negative matrix factorization
Background: The extended use of microarray technologies has enabled the generation and accumulation of gene expression datasets that contain expression levels of thousands of gene...
Pedro Carmona-Saez, Roberto D. Pascual-Marqui, Fra...
SENSYS
2004
ACM
15 years 5 months ago
Call and response: experiments in sampling the environment
Monitoring of environmental phenomena with embedded networked sensing confronts the challenges of both unpredictable variability in the spatial distribution of phenomena, coupled ...
Maxim A. Batalin, Mohammad H. Rahimi, Yan Yu, Duo ...
CORR
2008
Springer
119views Education» more  CORR 2008»
14 years 12 months ago
Self-stabilizing Numerical Iterative Computation
Many challenging tasks in sensor networks, including sensor calibration, ranking of nodes, monitoring, event region detection, collaborative filtering, collaborative signal proces...
Ezra N. Hoch, Danny Bickson, Danny Dolev